<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-05-20T06:26:47</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:19990524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-1999-0524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-1999-0524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0524" source="CVE"/>
    <reference ref_id="SUSE CVE-1999-0524" ref_url="https://www.suse.com/security/cve/CVE-1999-0524" source="SUSE CVE"/>
    <description>
    ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-1999-0524/">CVE-1999-0524</cve>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2002-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1122-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html" source="SUSE-SU"/>
    <description>
    schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<bugzilla href="https://bugzilla.suse.com/825985">SUSE bug 825985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871411">SUSE bug 871411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887734">SUSE bug 887734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20031605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-1605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2003-1605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1605" source="CVE"/>
    <reference ref_id="SUSE CVE-2003-1605" ref_url="https://www.suse.com/security/cve/CVE-2003-1605" source="SUSE CVE"/>
    <description>
    curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2003-1605/">CVE-2003-1605</cve>
	<bugzilla href="https://bugzilla.suse.com/1105868">SUSE bug 1105868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-0230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0230" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
    <description>
    TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-04-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230</cve>
	<bugzilla href="https://bugzilla.suse.com/1184394">SUSE bug 1184394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198501">SUSE bug 1198501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2004:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2004-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2006:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0950-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00097.html" source="SUSE-SU"/>
    <description>
    The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142038" comment="mailx-12.5-25.15 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514381" comment="mailx-12.5-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-2779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2779" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-2779" ref_url="https://www.suse.com/security/cve/CVE-2004-2779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003823.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00067.html" source="SUSE-SU"/>
    <description>
    id3_utf16_deserialize() in utf16.c in libid3tag through 0.15.1b misparses ID3v2 tags encoded in UTF-16 with an odd number of bytes, triggering an endless loop allocating memory until an OOM condition is reached, leading to denial-of-service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2004-2779/">CVE-2004-2779</cve>
	<bugzilla href="https://bugzilla.suse.com/1081959">SUSE bug 1081959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173108" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519025" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-1264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1264" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-1264" ref_url="https://www.suse.com/security/cve/CVE-2005-1264" source="SUSE CVE"/>
    <description>
    Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2005-1264/">CVE-2005-1264</cve>
	<bugzilla href="https://bugzilla.suse.com/84043">SUSE bug 84043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-1265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1265" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-1265" ref_url="https://www.suse.com/security/cve/CVE-2005-1265" source="SUSE CVE"/>
    <description>
    The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-1265/">CVE-2005-1265</cve>
	<bugzilla href="https://bugzilla.suse.com/84728">SUSE bug 84728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-2553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2553" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-2553" ref_url="https://www.suse.com/security/cve/CVE-2005-2553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2006:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-02/msg00021.html" source="SUSE-SU"/>
    <description>
    The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-2553/">CVE-2005-2553</cve>
	<bugzilla href="https://bugzilla.suse.com/139565">SUSE bug 139565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-3590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3590" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-3590" ref_url="https://www.suse.com/security/cve/CVE-2005-3590" source="SUSE CVE"/>
    <description>
    The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-3590/">CVE-2005-3590</cve>
	<bugzilla href="https://bugzilla.suse.com/1132195">SUSE bug 1132195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-4886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4886" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-4886" ref_url="https://www.suse.com/security/cve/CVE-2005-4886" source="SUSE CVE"/>
    <description>
    The selinux_parse_skb_ipv6 function in security/selinux/hooks.c in the Linux kernel before 2.6.12-rc4 allows remote attackers to cause a denial of service (OOPS) via vectors associated with an incorrect call to the ipv6_skip_exthdr function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2005-4886/">CVE-2005-4886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-0855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2006:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2006:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<bugzilla href="https://bugzilla.suse.com/153057">SUSE bug 153057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-2607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2006:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-05/msg00017.html" source="SUSE-SU"/>
    <description>
    do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<bugzilla href="https://bugzilla.suse.com/178863">SUSE bug 178863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537178">SUSE bug 537178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141279" comment="cron-4.2-55.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141280" comment="cronie-1.4.11-55.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2006:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in libmusicbrainz (aka mb_client or MusicBrainz Client Library) 2.1.2 and earlier, and SVN 8406 and earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a long Location header by the HTTP server, which triggers an overflow in the MBHttp::Download function in lib/http.cpp; and (2) a long URL in RDF data, as demonstrated by a URL in an rdf:resource field in an RDF XML document, which triggers overflows in many functions in lib/rdfparse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<bugzilla href="https://bugzilla.suse.com/199134">SUSE bug 199134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2006:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<bugzilla href="https://bugzilla.suse.com/200181">SUSE bug 200181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/355864">SUSE bug 355864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/356187">SUSE bug 356187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/357978">SUSE bug 357978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/372642">SUSE bug 372642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/374257">SUSE bug 374257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/386009">SUSE bug 386009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709852">SUSE bug 709852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4980" ref_url="https://www.suse.com/security/cve/CVE-2006-4980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2006:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4980/">CVE-2006-4980</cve>
	<bugzilla href="https://bugzilla.suse.com/208223">SUSE bug 208223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/406051">SUSE bug 406051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-7250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7250" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00039.html" source="SUSE-SU"/>
    <description>
    The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<bugzilla href="https://bugzilla.suse.com/748738">SUSE bug 748738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883307">SUSE bug 883307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-7254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7254" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-7254" ref_url="https://www.suse.com/security/cve/CVE-2006-7254" source="SUSE CVE"/>
    <description>
    The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7254/">CVE-2006-7254</cve>
	<bugzilla href="https://bugzilla.suse.com/1132193">SUSE bug 1132193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-0899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0899" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-0899" ref_url="https://www.suse.com/security/cve/CVE-2007-0899" source="SUSE CVE"/>
    <description>
    There is a possible heap overflow in libclamav/fsg.c before 0.100.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0899/">CVE-2007-0899</cve>
	<bugzilla href="https://bugzilla.suse.com/1156183">SUSE bug 1156183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334331" comment="clamav is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-1669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669" source="SUSE CVE"/>
    <description>
    zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1) Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2) Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3) AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<bugzilla href="https://bugzilla.suse.com/271781">SUSE bug 271781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-2052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2007:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2007-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052</cve>
	<bugzilla href="https://bugzilla.suse.com/276889">SUSE bug 276889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-2721" ref_url="https://www.suse.com/security/cve/CVE-2007-2721" source="SUSE CVE"/>
    <description>
    The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files, as originally demonstrated using imagemagick convert.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2721/">CVE-2007-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/258253">SUSE bug 258253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/339731">SUSE bug 339731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/340138">SUSE bug 340138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-3126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3126" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-3126" ref_url="https://www.suse.com/security/cve/CVE-2007-3126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0994-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Gimp before 2.8.22 allows context-dependent attackers to cause a denial of service (crash) via an ICO file with an InfoHeader containing a Height of zero, a similar issue to CVE-2007-2237.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-3126/">CVE-2007-3126</cve>
	<bugzilla href="https://bugzilla.suse.com/1032241">SUSE bug 1032241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518545" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518546" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518547" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518548" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518549" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-3852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3852" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852" source="SUSE CVE"/>
    <description>
    The init script (sysstat.in) in sysstat 5.1.2 up to 7.1.6 creates /tmp/sysstat.run insecurely, which allows local users to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852</cve>
	<bugzilla href="https://bugzilla.suse.com/298308">SUSE bug 298308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334321" comment="sysstat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-3999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2007:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2007-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2007:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2007-11/msg00003.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<bugzilla href="https://bugzilla.suse.com/302377">SUSE bug 302377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/305261">SUSE bug 305261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141676" comment="librpcsecgss3-0.19-16.56 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4129" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129" source="SUSE CVE"/>
    <description>
    CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<bugzilla href="https://bugzilla.suse.com/304180">SUSE bug 304180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140495" comment="coolkey-1.1.0-147.71 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512065" comment="coolkey-1.1.0-148.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4308" ref_url="https://www.suse.com/security/cve/CVE-2007-4308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:064" ref_url="https://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html" source="SUSE-SU"/>
    <description>
    The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4308/">CVE-2007-4308</cve>
	<bugzilla href="https://bugzilla.suse.com/326270">SUSE bug 326270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/329764">SUSE bug 329764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4567" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4567" ref_url="https://www.suse.com/security/cve/CVE-2007-4567" source="SUSE CVE"/>
    <description>
    The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4567/">CVE-2007-4567</cve>
	<bugzilla href="https://bugzilla.suse.com/307626">SUSE bug 307626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570608">SUSE bug 570608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4571" ref_url="https://www.suse.com/security/cve/CVE-2007-4571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:053" ref_url="https://lists.opensuse.org/opensuse-security-announce/2007-10/msg00000.html" source="SUSE-SU"/>
    <description>
    The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2007-4571/">CVE-2007-4571</cve>
	<bugzilla href="https://bugzilla.suse.com/328404">SUSE bug 328404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515793" comment="libecpg6-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515794" comment="libpq5-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515795" comment="libpq5-32bit-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515790" comment="postgresql93-9.3.11-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515796" comment="postgresql94-9.4.6-7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515793" comment="libecpg6-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515794" comment="libpq5-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515795" comment="libpq5-32bit-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515796" comment="postgresql94-9.4.6-7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4774" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4774" ref_url="https://www.suse.com/security/cve/CVE-2007-4774" source="SUSE CVE"/>
    <description>
    The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4774/">CVE-2007-4774</cve>
	<bugzilla href="https://bugzilla.suse.com/1161116">SUSE bug 1161116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-5970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5970" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970" source="SUSE CVE"/>
    <description>
    MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<bugzilla href="https://bugzilla.suse.com/348307">SUSE bug 348307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141565" comment="libmysqlclient18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141566" comment="libmysqlclient18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141567" comment="libmysqlclient_r18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141568" comment="libmysqlclient_r18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141569" comment="mariadb-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141570" comment="mariadb-client-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141571" comment="mariadb-errormessages-10.0.11-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6209" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6209" ref_url="https://www.suse.com/security/cve/CVE-2007-6209" source="SUSE CVE"/>
    <description>
    Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6209/">CVE-2007-6209</cve>
	<bugzilla href="https://bugzilla.suse.com/346454">SUSE bug 346454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339511" comment="zsh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335</cve>
	<bugzilla href="https://bugzilla.suse.com/343277">SUSE bug 343277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334331" comment="clamav is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537706">SUSE bug 537706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6720" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6720" ref_url="https://www.suse.com/security/cve/CVE-2007-6720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html" source="SUSE-SU"/>
    <description>
    libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6720/">CVE-2007-6720</cve>
	<bugzilla href="https://bugzilla.suse.com/468760">SUSE bug 468760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000582.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00052.html" source="SUSE-SU"/>
    <description>
    telepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<bugzilla href="https://bugzilla.suse.com/817120">SUSE bug 817120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141815" comment="telepathy-idle-0.2.0-1.62 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6761" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6761" ref_url="https://www.suse.com/security/cve/CVE-2007-6761" source="SUSE CVE"/>
    <description>
    drivers/media/video/videobuf-vmalloc.c in the Linux kernel before 2.6.24 does not initialize videobuf_mapping data structures, which allows local users to trigger an incorrect count value and videobuf leak via unspecified vectors, a different vulnerability than CVE-2010-5321.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6761/">CVE-2007-6761</cve>
	<bugzilla href="https://bugzilla.suse.com/1035720">SUSE bug 1035720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6762" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6762" ref_url="https://www.suse.com/security/cve/CVE-2007-6762" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def-&gt;tags[] array.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6762/">CVE-2007-6762</cve>
	<bugzilla href="https://bugzilla.suse.com/1143172">SUSE bug 1143172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-0352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0352" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-0352" ref_url="https://www.suse.com/security/cve/CVE-2008-0352" source="SUSE CVE"/>
    <description>
    The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0352/">CVE-2008-0352</cve>
	<bugzilla href="https://bugzilla.suse.com/307626">SUSE bug 307626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-0674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-0674" ref_url="https://www.suse.com/security/cve/CVE-2008-0674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0674/">CVE-2008-0674</cve>
	<bugzilla href="https://bugzilla.suse.com/359153">SUSE bug 359153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-0928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928</cve>
	<bugzilla href="https://bugzilla.suse.com/362956">SUSE bug 362956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1227" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1227" ref_url="https://www.suse.com/security/cve/CVE-2008-1227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the silc_fingerprint function in lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 1.1.5, and unspecified earlier versions, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via long input data.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1227/">CVE-2008-1227</cve>
	<bugzilla href="https://bugzilla.suse.com/369067">SUSE bug 369067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141677" comment="libsilc-1_1-2-1.1.10-24.128 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141678" comment="libsilcclient-1_1-3-1.1.10-24.128 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141679" comment="silc-toolkit-1.1.10-24.128 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<bugzilla href="https://bugzilla.suse.com/372246">SUSE bug 372246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="TID7005435" ref_url="https://www.suse.com/support/kb/doc/?id=7005435" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00032.html" source="SUSE-SU"/>
    <description>
    OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-05"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/373527">SUSE bug 373527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585630">SUSE bug 585630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647633">SUSE bug 647633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706386">SUSE bug 706386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518396" comment="openssh-7.2p2-74.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518397" comment="openssh-askpass-gnome-7.2p2-74.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518398" comment="openssh-helpers-7.2p2-74.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00004.html" source="SUSE-SU"/>
    <description>
    Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<bugzilla href="https://bugzilla.suse.com/377602">SUSE bug 377602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/379098">SUSE bug 379098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141823" comment="vorbis-tools-1.4.0-16.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141824" comment="vorbis-tools-lang-1.4.0-16.9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721</cve>
	<bugzilla href="https://bugzilla.suse.com/379044">SUSE bug 379044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1887" ref_url="https://www.suse.com/security/cve/CVE-2008-1887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" source="SUSE-SU"/>
    <description>
    Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1887/">CVE-2008-1887</cve>
	<bugzilla href="https://bugzilla.suse.com/379534">SUSE bug 379534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<bugzilla href="https://bugzilla.suse.com/362956">SUSE bug 362956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2109" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003823.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00067.html" source="SUSE-SU"/>
    <description>
    field.c in the libid3tag 0.15.0b library allows context-dependent attackers to cause a denial of service (CPU consumption) via an ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<bugzilla href="https://bugzilla.suse.com/387731">SUSE bug 387731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141536" comment="libid3tag0-0.15.1b-182.58 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173108" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519025" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315</cve>
	<bugzilla href="https://bugzilla.suse.com/406051">SUSE bug 406051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/443653">SUSE bug 443653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2365" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2365" ref_url="https://www.suse.com/security/cve/CVE-2008-2365" source="SUSE CVE"/>
    <description>
    Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &amp;dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514.  NOTE: this issue might only affect kernel versions before 2.6.16.x.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2365/">CVE-2008-2365</cve>
	<bugzilla href="https://bugzilla.suse.com/404288">SUSE bug 404288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2382" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<bugzilla href="https://bugzilla.suse.com/461565">SUSE bug 461565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/464142">SUSE bug 464142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3272" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3272" ref_url="https://www.suse.com/security/cve/CVE-2008-3272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3272/">CVE-2008-3272</cve>
	<bugzilla href="https://bugzilla.suse.com/414947">SUSE bug 414947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3275" ref_url="https://www.suse.com/security/cve/CVE-2008-3275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:036" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00001.html" source="SUSE-SU"/>
    <description>
    The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3275/">CVE-2008-3275</cve>
	<bugzilla href="https://bugzilla.suse.com/413936">SUSE bug 413936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html" source="SUSE-SU"/>
    <description>
    pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<bugzilla href="https://bugzilla.suse.com/425861">SUSE bug 425861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3915" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3915" ref_url="https://www.suse.com/security/cve/CVE-2008-3915" source="SUSE CVE"/>
    <description>
    Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3915/">CVE-2008-3915</cve>
	<bugzilla href="https://bugzilla.suse.com/423515">SUSE bug 423515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<bugzilla href="https://bugzilla.suse.com/445677">SUSE bug 445677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141788" comment="python-libxml2-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<bugzilla href="https://bugzilla.suse.com/441368">SUSE bug 441368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141788" comment="python-libxml2-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<bugzilla href="https://bugzilla.suse.com/382708">SUSE bug 382708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/449927">SUSE bug 449927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475541">SUSE bug 475541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142107" comment="libgio-fam-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141373" comment="glib2-lang-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141374" comment="glib2-tools-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141375" comment="libgio-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141376" comment="libgio-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141377" comment="libgio-fam-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141378" comment="libglib-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141379" comment="libglib-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141380" comment="libgmodule-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141381" comment="libgmodule-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141382" comment="libgobject-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141383" comment="libgobject-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141384" comment="libgthread-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141385" comment="libgthread-2_0-0-32bit-2.38.2-5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409" source="SUSE CVE"/>
    <description>
    libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<bugzilla href="https://bugzilla.suse.com/432486">SUSE bug 432486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141788" comment="python-libxml2-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/435135">SUSE bug 435135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/448551">SUSE bug 448551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4546" ref_url="https://www.suse.com/security/cve/CVE-2008-4546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4546/">CVE-2008-4546</cve>
	<bugzilla href="https://bugzilla.suse.com/436058">SUSE bug 436058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4936" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936" source="SUSE CVE"/>
    <description>
    faxspool in mgetty 1.1.36 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/faxsp.##### temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936</cve>
	<bugzilla href="https://bugzilla.suse.com/442596">SUSE bug 442596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141348" comment="g3utils-1.1.36-54.100 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141349" comment="mgetty-1.1.36-54.100 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<bugzilla href="https://bugzilla.suse.com/392947">SUSE bug 392947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/441856">SUSE bug 441856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/467911">SUSE bug 467911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
    <description>
    OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/465675">SUSE bug 465675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/465676">SUSE bug 465676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/468866">SUSE bug 468866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/470968">SUSE bug 470968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475108">SUSE bug 475108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552497">SUSE bug 552497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708266">SUSE bug 708266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<bugzilla href="https://bugzilla.suse.com/468762">SUSE bug 468762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5984" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5984" ref_url="https://www.suse.com/security/cve/CVE-2008-5984" source="SUSE CVE"/>
    <description>
    Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5984/">CVE-2008-5984</cve>
	<bugzilla href="https://bugzilla.suse.com/470096">SUSE bug 470096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141299" comment="dia-0.97.2-13.253 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141300" comment="dia-lang-0.97.2-13.253 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142087" comment="dia-0.97.3-15.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142088" comment="dia-lang-0.97.3-15.63 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-7247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00006.html" source="SUSE-SU"/>
    <description>
    sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141565" comment="libmysqlclient18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141566" comment="libmysqlclient18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141567" comment="libmysqlclient_r18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141568" comment="libmysqlclient_r18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141569" comment="mariadb-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141570" comment="mariadb-client-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141571" comment="mariadb-errormessages-10.0.11-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-7316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7316" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-7316" ref_url="https://www.suse.com/security/cve/CVE-2008-7316" source="SUSE CVE"/>
    <description>
    mm/filemap.c in the Linux kernel before 2.6.25 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers an iovec of zero length, followed by a page fault for an iovec of nonzero length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-7316/">CVE-2008-7316</cve>
	<bugzilla href="https://bugzilla.suse.com/963764">SUSE bug 963764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0035" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035" source="SUSE CVE"/>
    <description>
    alsa-utils 1.0.19 and later versions allows local users to overwrite arbitrary files via a symlink attack via the /usr/bin/alsa-info and /usr/bin/alsa-info.sh scripts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<bugzilla href="https://bugzilla.suse.com/533396">SUSE bug 533396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141209" comment="alsa-1.0.27.2-11.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141210" comment="libasound2-1.0.27.2-11.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140446" comment="libasound2-32bit-1.0.27.2-11.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158925" comment="alsa-1.0.27.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158927" comment="libasound2-1.0.27.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158928" comment="libasound2-32bit-1.0.27.2-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0036" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0036" ref_url="https://www.suse.com/security/cve/CVE-2009-0036" source="SUSE CVE"/>
    <description>
    Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c in libvirt_proxy 0.5.1 might allow local users to gain privileges by sending a portion of the header of a virProxyPacket packet, and then sending the remainder of the packet with crafted values in the header, related to use of uninitialized memory in a validation check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2009-0036/">CVE-2009-0036</cve>
	<bugzilla href="https://bugzilla.suse.com/1085554">SUSE bug 1085554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html" source="SUSE-SU"/>
    <description>
    The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<bugzilla href="https://bugzilla.suse.com/475103">SUSE bug 475103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527990">SUSE bug 527990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<bugzilla href="https://bugzilla.suse.com/472745">SUSE bug 472745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608040">SUSE bug 608040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<bugzilla href="https://bugzilla.suse.com/484653">SUSE bug 484653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501632">SUSE bug 501632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141758" comment="ntp-4.2.6p5-24.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141759" comment="ntp-doc-4.2.6p5-24.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<bugzilla href="https://bugzilla.suse.com/485895">SUSE bug 485895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html" source="SUSE-SU"/>
    <description>
    libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179</cve>
	<bugzilla href="https://bugzilla.suse.com/468760">SUSE bug 468760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<bugzilla href="https://bugzilla.suse.com/481769">SUSE bug 481769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105600" comment="libsndfile1-1.0.25-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105601" comment="libsndfile1-32bit-1.0.25-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141680" comment="libsndfile1-1.0.25-18.75 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141681" comment="libsndfile1-32bit-1.0.25-18.75 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0269" ref_url="https://www.suse.com/security/cve/CVE-2009-0269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
    <description>
    fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0269/">CVE-2009-0269</cve>
	<bugzilla href="https://bugzilla.suse.com/470942">SUSE bug 470942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0316" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316" source="SUSE CVE"/>
    <description>
    Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<bugzilla href="https://bugzilla.suse.com/470100">SUSE bug 470100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140673" comment="gvim-7.4.326-2.62 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140674" comment="vim-7.4.326-2.62 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140675" comment="vim-data-7.4.326-2.62 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157587" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157588" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157589" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0322" ref_url="https://www.suse.com/security/cve/CVE-2009-0322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
    <description>
    drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0322/">CVE-2009-0322</cve>
	<bugzilla href="https://bugzilla.suse.com/470943">SUSE bug 470943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0342" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0342" ref_url="https://www.suse.com/security/cve/CVE-2009-0342" source="SUSE CVE"/>
    <description>
    Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0342/">CVE-2009-0342</cve>
	<bugzilla href="https://bugzilla.suse.com/483819">SUSE bug 483819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483820">SUSE bug 483820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<bugzilla href="https://bugzilla.suse.com/480262">SUSE bug 480262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548555">SUSE bug 548555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
    <description>
    The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0591" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<bugzilla href="https://bugzilla.suse.com/499104">SUSE bug 499104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140518" comment="cyrus-sasl-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140519" comment="cyrus-sasl-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140520" comment="cyrus-sasl-crammd5-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140521" comment="cyrus-sasl-crammd5-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140522" comment="cyrus-sasl-digestmd5-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141292" comment="cyrus-sasl-digestmd5-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140523" comment="cyrus-sasl-gssapi-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140524" comment="cyrus-sasl-gssapi-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140527" comment="cyrus-sasl-plain-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140528" comment="cyrus-sasl-plain-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140529" comment="cyrus-sasl-saslauthd-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140532" comment="libsasl2-3-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140533" comment="libsasl2-3-32bit-2.1.26-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512096" comment="cyrus-sasl-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512097" comment="cyrus-sasl-32bit-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512098" comment="cyrus-sasl-crammd5-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512099" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512100" comment="cyrus-sasl-digestmd5-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512101" comment="cyrus-sasl-digestmd5-32bit-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512102" comment="cyrus-sasl-gssapi-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512103" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512104" comment="cyrus-sasl-plain-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512105" comment="cyrus-sasl-plain-32bit-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512106" comment="cyrus-sasl-saslauthd-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512107" comment="libsasl2-3-2.1.26-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512108" comment="libsasl2-3-32bit-2.1.26-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:040" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00006.html" source="SUSE-SU"/>
    <description>
    The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<bugzilla href="https://bugzilla.suse.com/526185">SUSE bug 526185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<bugzilla href="https://bugzilla.suse.com/480865">SUSE bug 480865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141212" comment="avahi-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141213" comment="avahi-lang-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141214" comment="libavahi-client3-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141215" comment="libavahi-client3-32bit-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141216" comment="libavahi-common3-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141217" comment="libavahi-common3-32bit-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141218" comment="libavahi-core7-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141219" comment="libdns_sd-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141220" comment="libdns_sd-32bit-0.6.31-20.59 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0775" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 decode invisible characters when they are displayed in the location bar, which causes an incorrect address to be displayed and makes it easier for remote attackers to spoof URLs and conduct phishing attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<bugzilla href="https://bugzilla.suse.com/487762">SUSE bug 487762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141806" comment="strongswan-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141807" comment="strongswan-doc-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141808" comment="strongswan-ipsec-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141809" comment="strongswan-libs0-5.1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793" source="SUSE CVE"/>
    <description>
    cmsxform.c in LittleCMS (aka lcms or liblcms) 1.18, as used in OpenJDK and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted image that triggers execution of incorrect code for "transformations of monochrome profiles."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<bugzilla href="https://bugzilla.suse.com/490610">SUSE bug 490610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521512">SUSE bug 521512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521513">SUSE bug 521513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141435" comment="lcms-1.19-17.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0834" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0834" ref_url="https://www.suse.com/security/cve/CVE-2009-0834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
    <description>
    The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-05-22"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0834/">CVE-2009-0834</cve>
	<bugzilla href="https://bugzilla.suse.com/483819">SUSE bug 483819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483820">SUSE bug 483820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0835" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0835" ref_url="https://www.suse.com/security/cve/CVE-2009-0835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
    <description>
    The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-05-29"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0835/">CVE-2009-0835</cve>
	<bugzilla href="https://bugzilla.suse.com/483819">SUSE bug 483819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483820">SUSE bug 483820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00005.html" source="SUSE-SU"/>
    <description>
    The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00005.html" source="SUSE-SU"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<bugzilla href="https://bugzilla.suse.com/485894">SUSE bug 485894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7003100" ref_url="https://www.suse.com/support/kb/doc/?id=7003100" source="SUSE-SU"/>
    <description>
    The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<bugzilla href="https://bugzilla.suse.com/486723">SUSE bug 486723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00005.html" source="SUSE-SU"/>
    <description>
    The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0901" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0901" ref_url="https://www.suse.com/security/cve/CVE-2009-0901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not prevent VariantClear calls on an uninitialized VARIANT, which allows remote attackers to execute arbitrary code via a malformed stream to an ATL (1) component or (2) control, related to ATL headers and error handling, aka "ATL Uninitialized Object Vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0901/">CVE-2009-0901</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0024-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<bugzilla href="https://bugzilla.suse.com/512559">SUSE bug 512559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515124">SUSE bug 515124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541632">SUSE bug 541632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601349">SUSE bug 601349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644114">SUSE bug 644114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<bugzilla href="https://bugzilla.suse.com/485889">SUSE bug 485889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496289">SUSE bug 496289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541626">SUSE bug 541626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1044" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/488955">SUSE bug 488955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1046" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1046" ref_url="https://www.suse.com/security/cve/CVE-2009-1046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00007.html" source="SUSE-SU"/>
    <description>
    The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1046/">CVE-2009-1046</cve>
	<bugzilla href="https://bugzilla.suse.com/478699">SUSE bug 478699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1072" ref_url="https://www.suse.com/security/cve/CVE-2009-1072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00004.html" source="SUSE-SU"/>
    <description>
    nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1072/">CVE-2009-1072</cve>
	<bugzilla href="https://bugzilla.suse.com/487681">SUSE bug 487681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/497551">SUSE bug 497551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<bugzilla href="https://bugzilla.suse.com/488955">SUSE bug 488955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509766">SUSE bug 509766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/510964">SUSE bug 510964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1185" ref_url="https://www.suse.com/security/cve/CVE-2009-1185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html" source="SUSE-SU"/>
    <description>
    udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1185/">CVE-2009-1185</cve>
	<bugzilla href="https://bugzilla.suse.com/1034330">SUSE bug 1034330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493158">SUSE bug 493158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550249">SUSE bug 550249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776925">SUSE bug 776925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187" source="SUSE CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to CairoOutputDev (CairoOutputDev.cc).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508153">SUSE bug 508153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508154">SUSE bug 508154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539875">SUSE bug 539875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188" source="SUSE CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508153">SUSE bug 508153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508154">SUSE bug 508154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539875">SUSE bug 539875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546400">SUSE bug 546400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<bugzilla href="https://bugzilla.suse.com/491449">SUSE bug 491449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<bugzilla href="https://bugzilla.suse.com/501632">SUSE bug 501632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141758" comment="ntp-4.2.6p5-24.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141759" comment="ntp-doc-4.2.6p5-24.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1273" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273" source="SUSE CVE"/>
    <description>
    pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<bugzilla href="https://bugzilla.suse.com/492764">SUSE bug 492764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/507729">SUSE bug 507729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date; and (2) js_CheckRedeclaration.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindings and remote stylesheets, as exploited in the wild by a March 2009 eBay listing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the MozSearch plugin implementation in Mozilla Firefox before 3.0.9 allows user-assisted remote attackers to inject arbitrary web script or HTML via a javascript: URI in the SearchForm element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313" source="SUSE CVE"/>
    <description>
    The nsTextFrame::ClearTextRun function in layout/generic/nsTextFrameThebes.cpp in Mozilla Firefox 3.0.9 allows remote attackers to cause a denial of service (memory corruption) and probably execute arbitrary code via unspecified vectors.  NOTE: this vulnerability reportedly exists because of an incorrect fix for CVE-2009-1302.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<bugzilla href="https://bugzilla.suse.com/500909">SUSE bug 500909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502062">SUSE bug 502062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1337" ref_url="https://www.suse.com/security/cve/CVE-2009-1337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00004.html" source="SUSE-SU"/>
    <description>
    The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1337/">CVE-2009-1337</cve>
	<bugzilla href="https://bugzilla.suse.com/1171985">SUSE bug 1171985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492768">SUSE bug 492768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1364" ref_url="https://www.suse.com/security/cve/CVE-2009-1364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1134-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1364/">CVE-2009-1364</cve>
	<bugzilla href="https://bugzilla.suse.com/495842">SUSE bug 495842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514965" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384" source="SUSE CVE"/>
    <description>
    pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<bugzilla href="https://bugzilla.suse.com/507729">SUSE bug 507729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509031">SUSE bug 509031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515659">SUSE bug 515659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509031">SUSE bug 509031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515659">SUSE bug 515659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1415" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1415" ref_url="https://www.suse.com/security/cve/CVE-2009-1415" source="SUSE CVE"/>
    <description>
    lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1415/">CVE-2009-1415</cve>
	<bugzilla href="https://bugzilla.suse.com/497886">SUSE bug 497886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505494">SUSE bug 505494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546371">SUSE bug 546371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557126">SUSE bug 557126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557127">SUSE bug 557127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557128">SUSE bug 557128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557671">SUSE bug 557671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1630" ref_url="https://www.suse.com/security/cve/CVE-2009-1630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:038" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00007.html" source="SUSE-SU"/>
    <description>
    The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1630/">CVE-2009-1630</cve>
	<bugzilla href="https://bugzilla.suse.com/1175689">SUSE bug 1175689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503353">SUSE bug 503353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<bugzilla href="https://bugzilla.suse.com/527538">SUSE bug 527538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527539">SUSE bug 527539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141436" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172641" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172642" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172643" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<bugzilla href="https://bugzilla.suse.com/527538">SUSE bug 527538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527539">SUSE bug 527539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141436" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172641" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172642" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172643" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1862" ref_url="https://www.suse.com/security/cve/CVE-2009-1862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1862/">CVE-2009-1862</cve>
	<bugzilla href="https://bugzilla.suse.com/524508">SUSE bug 524508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1863" ref_url="https://www.suse.com/security/cve/CVE-2009-1863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to a "privilege escalation vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1863/">CVE-2009-1863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1864" ref_url="https://www.suse.com/security/cve/CVE-2009-1864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1864/">CVE-2009-1864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1865" ref_url="https://www.suse.com/security/cve/CVE-2009-1865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, related to a "null pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1865/">CVE-2009-1865</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1866" ref_url="https://www.suse.com/security/cve/CVE-2009-1866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1866/">CVE-2009-1866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1867" ref_url="https://www.suse.com/security/cve/CVE-2009-1867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to trick a user into (1) selecting a link or (2) completing a dialog, related to a "clickjacking vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1867/">CVE-2009-1867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1868" ref_url="https://www.suse.com/security/cve/CVE-2009-1868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors involving URL parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1868/">CVE-2009-1868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1869" ref_url="https://www.suse.com/security/cve/CVE-2009-1869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ActionScript Virtual Machine 2 (AVM2) abcFile parser in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an AVM2 file with a large intrf_count value that triggers a dereference of an out-of-bounds pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1869/">CVE-2009-1869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1870" ref_url="https://www.suse.com/security/cve/CVE-2009-1870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to obtain sensitive information via vectors involving saving an SWF file to a hard drive, related to a "local sandbox vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1870/">CVE-2009-1870</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1885" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<bugzilla href="https://bugzilla.suse.com/530708">SUSE bug 530708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108092" comment="libxerces-c-3_1-3.1.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108093" comment="libxerces-c-3_1-32bit-3.1.1-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141747" comment="libxerces-c-3_1-3.1.1-1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141748" comment="libxerces-c-3_1-32bit-3.1.1-1.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<bugzilla href="https://bugzilla.suse.com/513360">SUSE bug 513360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<bugzilla href="https://bugzilla.suse.com/513360">SUSE bug 513360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892" source="SUSE CVE"/>
    <description>
    dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<bugzilla href="https://bugzilla.suse.com/519413">SUSE bug 519413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<bugzilla href="https://bugzilla.suse.com/518698">SUSE bug 518698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<bugzilla href="https://bugzilla.suse.com/519796">SUSE bug 519796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616827">SUSE bug 616827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2395" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2395" ref_url="https://www.suse.com/security/cve/CVE-2009-2395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
    <description>
    SQL injection vulnerability in the K2 (com_k2) component 1.0.1 Beta and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter in an itemlist action to index.php.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2395/">CVE-2009-2395</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<bugzilla href="https://bugzilla.suse.com/527990">SUSE bug 527990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528372">SUSE bug 528372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470" source="SUSE CVE"/>
    <description>
    Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
    <description>
    neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<bugzilla href="https://bugzilla.suse.com/528370">SUSE bug 528370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/532345">SUSE bug 532345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2474" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474" source="SUSE CVE"/>
    <description>
    neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<bugzilla href="https://bugzilla.suse.com/528370">SUSE bug 528370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2493" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2493" ref_url="https://www.suse.com/security/cve/CVE-2009-2493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:053" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00001.html" source="SUSE-SU"/>
    <description>
    The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2493/">CVE-2009-2493</cve>
	<bugzilla href="https://bugzilla.suse.com/548655">SUSE bug 548655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558653">SUSE bug 558653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564513">SUSE bug 564513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566705">SUSE bug 566705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" source="SUSE-SU"/>
    <description>
    The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<bugzilla href="https://bugzilla.suse.com/570331">SUSE bug 570331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588113">SUSE bug 588113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512188" comment="gzip-1.6-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:053" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00014.html" source="SUSE-SU"/>
    <description>
    XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/525562">SUSE bug 525562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/530717">SUSE bug 530717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534025">SUSE bug 534025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534721">SUSE bug 534721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537969">SUSE bug 537969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/540945">SUSE bug 540945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548655">SUSE bug 548655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550664">SUSE bug 550664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553220">SUSE bug 553220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610080">SUSE bug 610080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611932">SUSE bug 611932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141325" comment="expat-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141326" comment="libexpat1-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141327" comment="libexpat1-32bit-2.1.0-13.232 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<bugzilla href="https://bugzilla.suse.com/527489">SUSE bug 527489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00006.html" source="SUSE-SU"/>
    <description>
    socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<bugzilla href="https://bugzilla.suse.com/528746">SUSE bug 528746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141329" comment="fetchmail-6.3.26-5.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2694" ref_url="https://www.suse.com/security/cve/CVE-2009-2694" source="SUSE CVE"/>
    <description>
    The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2694/">CVE-2009-2694</cve>
	<bugzilla href="https://bugzilla.suse.com/527100">SUSE bug 527100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2703" ref_url="https://www.suse.com/security/cve/CVE-2009-2703" source="SUSE CVE"/>
    <description>
    libpurple/protocols/irc/msgs.c in the IRC protocol plugin in libpurple in Pidgin before 2.6.2 allows remote IRC servers to cause a denial of service (NULL pointer dereference and application crash) via a TOPIC message that lacks a topic string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2703/">CVE-2009-2703</cve>
	<bugzilla href="https://bugzilla.suse.com/537214">SUSE bug 537214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2767" ref_url="https://www.suse.com/security/cve/CVE-2009-2767" source="SUSE CVE"/>
    <description>
    The init_posix_timers function in kernel/posix-timers.c in the Linux kernel before 2.6.31-rc6 allows local users to cause a denial of service (OOPS) or possibly gain privileges via a CLOCK_MONOTONIC_RAW clock_nanosleep call that triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2767/">CVE-2009-2767</cve>
	<bugzilla href="https://bugzilla.suse.com/529555">SUSE bug 529555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
    <description>
    Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539517">SUSE bug 539517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<bugzilla href="https://bugzilla.suse.com/548317">SUSE bug 548317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/551563">SUSE bug 551563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2848" ref_url="https://www.suse.com/security/cve/CVE-2009-2848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:054" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-&gt;clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2848/">CVE-2009-2848</cve>
	<bugzilla href="https://bugzilla.suse.com/527865">SUSE bug 527865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<bugzilla href="https://bugzilla.suse.com/540930">SUSE bug 540930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142140" comment="libnewt0_52-0.52.16-1.83 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
    <description>
    smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2910" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2910" ref_url="https://www.suse.com/security/cve/CVE-2009-2910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:051" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:054" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:055" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
    <description>
    arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2910/">CVE-2009-2910</cve>
	<bugzilla href="https://bugzilla.suse.com/1175785">SUSE bug 1175785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543740">SUSE bug 543740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
    <description>
    mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/542150">SUSE bug 542150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026</cve>
	<bugzilla href="https://bugzilla.suse.com/535570">SUSE bug 535570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550170">SUSE bug 550170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3069" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox before 3.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Visual truncation vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to trigger a vertical scroll and spoof URLs via unspecified Unicode characters with a tall line-height property.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to execute arbitrary JavaScript with chrome privileges via vectors involving an object, the FeedWriter, and the BrowserFeedWriter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083</cve>
	<bugzilla href="https://bugzilla.suse.com/536602">SUSE bug 536602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550170">SUSE bug 550170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084</cve>
	<bugzilla href="https://bugzilla.suse.com/536602">SUSE bug 536602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550170">SUSE bug 550170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does not properly handle an error IQ stanza during an attempted fetch of a custom smiley, which allows remote attackers to cause a denial of service (application crash) via XHTML-IM content with cid: images.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085</cve>
	<bugzilla href="https://bugzilla.suse.com/536602">SUSE bug 536602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550170">SUSE bug 550170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark 0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers to cause a denial of service (memory and CPU consumption) via malformed OPCUA Service CallRequest packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241</cve>
	<bugzilla href="https://bugzilla.suse.com/541654">SUSE bug 541654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in packet.c in the GSM A RR dissector in Wireshark 1.2.0 and 1.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors related to "an uninitialized dissector handle," which triggers an assertion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242</cve>
	<bugzilla href="https://bugzilla.suse.com/541659">SUSE bug 541659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the TLS dissector in Wireshark 1.2.0 and 1.2.1, when running on Windows, allows remote attackers to cause a denial of service (application crash) via unknown vectors related to TLS 1.2 conversations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243</cve>
	<bugzilla href="https://bugzilla.suse.com/541655">SUSE bug 541655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<bugzilla href="https://bugzilla.suse.com/587379">SUSE bug 587379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590833">SUSE bug 590833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/593560">SUSE bug 593560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641950">SUSE bug 641950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7005118" ref_url="https://www.suse.com/support/kb/doc/?id=7005118" source="SUSE-SU"/>
    <description>
    The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295</cve>
	<bugzilla href="https://bugzilla.suse.com/561347">SUSE bug 561347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<bugzilla href="https://bugzilla.suse.com/550002">SUSE bug 550002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550003">SUSE bug 550003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550004">SUSE bug 550004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577925">SUSE bug 577925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583536">SUSE bug 583536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620680">SUSE bug 620680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651598">SUSE bug 651598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141346" comment="fuse-2.9.3-3.65 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141347" comment="libfuse2-2.9.3-3.65 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512133" comment="fuse-2.9.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512134" comment="libfuse2-2.9.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557686">SUSE bug 557686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3377" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3378" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608192">SUSE bug 608192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3381" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3383" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3388" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
    <description>
    liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581722">SUSE bug 581722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<bugzilla href="https://bugzilla.suse.com/554861">SUSE bug 554861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578215">SUSE bug 578215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:057" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:061" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7005397" ref_url="https://www.suse.com/support/kb/doc/?id=7005397" source="SUSE-SU"/>
		<reference ref_id="TID7005950" ref_url="https://www.suse.com/support/kb/doc/?id=7005950" source="SUSE-SU"/>
		<reference ref_id="TID7008600" ref_url="https://www.suse.com/support/kb/doc/?id=7008600" source="SUSE-SU"/>
		<reference ref_id="TID7008930" ref_url="https://www.suse.com/support/kb/doc/?id=7008930" source="SUSE-SU"/>
		<reference ref_id="TID7009561" ref_url="https://www.suse.com/support/kb/doc/?id=7009561" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0100-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0182-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0754-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1025-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-27"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<bugzilla href="https://bugzilla.suse.com/1077582">SUSE bug 1077582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552497">SUSE bug 552497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553641">SUSE bug 553641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554069">SUSE bug 554069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554084">SUSE bug 554084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554085">SUSE bug 554085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/555177">SUSE bug 555177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557168">SUSE bug 557168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564507">SUSE bug 564507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566041">SUSE bug 566041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/584292">SUSE bug 584292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588996">SUSE bug 588996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590826">SUSE bug 590826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592589">SUSE bug 592589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594415">SUSE bug 594415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604782">SUSE bug 604782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/614753">SUSE bug 614753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622073">SUSE bug 622073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623905">SUSE bug 623905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642531">SUSE bug 642531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670152">SUSE bug 670152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704832">SUSE bug 704832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753357">SUSE bug 753357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799454">SUSE bug 799454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815621">SUSE bug 815621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/550666">SUSE bug 550666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561561">SUSE bug 561561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694595">SUSE bug 694595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725950">SUSE bug 725950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141325" comment="expat-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141326" comment="libexpat1-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141327" comment="libexpat1-32bit-2.1.0-13.232 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<bugzilla href="https://bugzilla.suse.com/546393">SUSE bug 546393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<bugzilla href="https://bugzilla.suse.com/543090">SUSE bug 543090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543410">SUSE bug 543410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546400">SUSE bug 546400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546404">SUSE bug 546404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/556049">SUSE bug 556049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3612" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3612" ref_url="https://www.suse.com/security/cve/CVE-2009-3612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-05"/>
	<updated date="2022-03-05"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3612/">CVE-2009-3612</cve>
	<bugzilla href="https://bugzilla.suse.com/536467">SUSE bug 536467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615</cve>
	<bugzilla href="https://bugzilla.suse.com/548072">SUSE bug 548072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550170">SUSE bug 550170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3623" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3623" ref_url="https://www.suse.com/security/cve/CVE-2009-3623" source="SUSE CVE"/>
    <description>
    The lookup_cb_cred function in fs/nfsd/nfs4callback.c in the nfsd4 subsystem in the Linux kernel before 2.6.31.2 attempts to access a credentials cache even when a client specifies the AUTH_NULL authentication flavor, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an NFSv4 mount request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3623/">CVE-2009-3623</cve>
	<bugzilla href="https://bugzilla.suse.com/549029">SUSE bug 549029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<bugzilla href="https://bugzilla.suse.com/550076">SUSE bug 550076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585716">SUSE bug 585716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<bugzilla href="https://bugzilla.suse.com/534721">SUSE bug 534721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550664">SUSE bug 550664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550666">SUSE bug 550666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561561">SUSE bug 561561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725950">SUSE bug 725950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141325" comment="expat-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141326" comment="libexpat1-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141327" comment="libexpat1-32bit-2.1.0-13.232 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" source="SUSE-SU"/>
    <description>
    ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<bugzilla href="https://bugzilla.suse.com/556122">SUSE bug 556122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140875" comment="libltdl7-2.4.2-14.60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140876" comment="libltdl7-32bit-2.4.2-14.60 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159156" comment="libltdl7-2.4.2-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159157" comment="libltdl7-32bit-2.4.2-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512352" comment="libltdl7-2.4.2-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512353" comment="libltdl7-32bit-2.4.2-17.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3793" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3793" ref_url="https://www.suse.com/security/cve/CVE-2009-3793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory consumption) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3793/">CVE-2009-3793</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3794" ref_url="https://www.suse.com/security/cve/CVE-2009-3794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:062" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via crafted dimensions of JPEG data in an SWF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3794/">CVE-2009-3794</cve>
	<bugzilla href="https://bugzilla.suse.com/560259">SUSE bug 560259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3796" ref_url="https://www.suse.com/security/cve/CVE-2009-3796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:062" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors, related to a "data injection vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3796/">CVE-2009-3796</cve>
	<bugzilla href="https://bugzilla.suse.com/560259">SUSE bug 560259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3797" ref_url="https://www.suse.com/security/cve/CVE-2009-3797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:062" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player 10.x before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3797/">CVE-2009-3797</cve>
	<bugzilla href="https://bugzilla.suse.com/560259">SUSE bug 560259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3798" ref_url="https://www.suse.com/security/cve/CVE-2009-3798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:062" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3798/">CVE-2009-3798</cve>
	<bugzilla href="https://bugzilla.suse.com/560259">SUSE bug 560259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3799" ref_url="https://www.suse.com/security/cve/CVE-2009-3799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:062" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Verifier::parseExceptionHandlers function in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via an SWF file with a large exception_count value that triggers memory corruption, related to "generation of ActionScript exception handlers."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3799/">CVE-2009-3799</cve>
	<bugzilla href="https://bugzilla.suse.com/560259">SUSE bug 560259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3800" ref_url="https://www.suse.com/security/cve/CVE-2009-3800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:062" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allow attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3800/">CVE-2009-3800</cve>
	<bugzilla href="https://bugzilla.suse.com/560259">SUSE bug 560259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<bugzilla href="https://bugzilla.suse.com/555173">SUSE bug 555173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557180">SUSE bug 557180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3951" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3951" ref_url="https://www.suse.com/security/cve/CVE-2009-3951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:062" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 on Windows allows remote attackers to obtain the names of local files via unknown vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4820.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3951/">CVE-2009-3951</cve>
	<bugzilla href="https://bugzilla.suse.com/560259">SUSE bug 560259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3980" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3982" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3995" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995</cve>
	<bugzilla href="https://bugzilla.suse.com/577875">SUSE bug 577875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625547">SUSE bug 625547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752802">SUSE bug 752802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3996" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3996" ref_url="https://www.suse.com/security/cve/CVE-2009-3996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00002.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3996/">CVE-2009-3996</cve>
	<bugzilla href="https://bugzilla.suse.com/577875">SUSE bug 577875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4012" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<bugzilla href="https://bugzilla.suse.com/569615">SUSE bug 569615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140966" comment="libthai-data-0.1.25-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140967" comment="libthai0-0.1.25-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140968" comment="libthai0-32bit-0.1.25-4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4019" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00006.html" source="SUSE-SU"/>
    <description>
    mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141565" comment="libmysqlclient18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141566" comment="libmysqlclient18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141567" comment="libmysqlclient_r18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141568" comment="libmysqlclient_r18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141569" comment="mariadb-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141570" comment="mariadb-client-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141571" comment="mariadb-errormessages-10.0.11-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:059" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<bugzilla href="https://bugzilla.suse.com/558260">SUSE bug 558260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570912">SUSE bug 570912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644911">SUSE bug 644911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4026" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
    <description>
    The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<bugzilla href="https://bugzilla.suse.com/558267">SUSE bug 558267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4027" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<bugzilla href="https://bugzilla.suse.com/558267">SUSE bug 558267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4028" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00006.html" source="SUSE-SU"/>
    <description>
    The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141565" comment="libmysqlclient18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141566" comment="libmysqlclient18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141567" comment="libmysqlclient_r18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141568" comment="libmysqlclient_r18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141569" comment="mariadb-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141570" comment="mariadb-client-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141571" comment="mariadb-errormessages-10.0.11-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000578.html" source="SUSE-SU"/>
    <description>
    The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786745">SUSE bug 786745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00006.html" source="SUSE-SU"/>
    <description>
    MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141565" comment="libmysqlclient18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141566" comment="libmysqlclient18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141567" comment="libmysqlclient_r18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141568" comment="libmysqlclient_r18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141569" comment="mariadb-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141570" comment="mariadb-client-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141571" comment="mariadb-errormessages-10.0.11-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<bugzilla href="https://bugzilla.suse.com/564710">SUSE bug 564710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603968">SUSE bug 603968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4131" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
    <description>
    The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<bugzilla href="https://bugzilla.suse.com/561018">SUSE bug 561018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564380">SUSE bug 564380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<bugzilla href="https://bugzilla.suse.com/564360">SUSE bug 564360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603969">SUSE bug 603969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
    <description>
    drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<bugzilla href="https://bugzilla.suse.com/564712">SUSE bug 564712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7005185" ref_url="https://www.suse.com/support/kb/doc/?id=7005185" source="SUSE-SU"/>
		<reference ref_id="TID7005397" ref_url="https://www.suse.com/support/kb/doc/?id=7005397" source="SUSE-SU"/>
    <description>
    Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<bugzilla href="https://bugzilla.suse.com/561351">SUSE bug 561351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4308" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4308" ref_url="https://www.suse.com/security/cve/CVE-2009-4308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The ext4_decode_error function in fs/ext4/super.c in the ext4 filesystem in the Linux kernel before 2.6.32 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference), and possibly have unspecified other impact, via a crafted read-only filesystem that lacks a journal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4308/">CVE-2009-4308</cve>
	<bugzilla href="https://bugzilla.suse.com/564382">SUSE bug 564382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4355" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" source="SUSE-SU"/>
    <description>
    Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552497">SUSE bug 552497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566238">SUSE bug 566238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4492" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492" source="SUSE CVE"/>
    <description>
    WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<bugzilla href="https://bugzilla.suse.com/570616">SUSE bug 570616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580482">SUSE bug 580482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
    <description>
    drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" source="SUSE-SU"/>
    <description>
    drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-403" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<bugzilla href="https://bugzilla.suse.com/735850">SUSE bug 735850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736174">SUSE bug 736174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759836">SUSE bug 759836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5044" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0642-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00029.html" source="SUSE-SU"/>
    <description>
    contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<bugzilla href="https://bugzilla.suse.com/698290">SUSE bug 698290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703666">SUSE bug 703666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5080" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080" source="SUSE CVE"/>
    <description>
    The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<bugzilla href="https://bugzilla.suse.com/703665">SUSE bug 703665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5081" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081" source="SUSE CVE"/>
    <description>
    The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<bugzilla href="https://bugzilla.suse.com/703666">SUSE bug 703666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<bugzilla href="https://bugzilla.suse.com/915976">SUSE bug 915976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922647">SUSE bug 922647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514602" comment="libopenssl0_9_8-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514603" comment="libopenssl0_9_8-32bit-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5147" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5147" ref_url="https://www.suse.com/security/cve/CVE-2009-5147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001661.html" source="SUSE-SU"/>
    <description>
    DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2009-5147/">CVE-2009-5147</cve>
	<bugzilla href="https://bugzilla.suse.com/939860">SUSE bug 939860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521815" comment="glibc-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521816" comment="glibc-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521817" comment="glibc-devel-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521818" comment="glibc-devel-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521819" comment="glibc-i18ndata-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521820" comment="glibc-locale-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521821" comment="glibc-locale-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521822" comment="nscd-2.22-100.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<bugzilla href="https://bugzilla.suse.com/570331">SUSE bug 570331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588113">SUSE bug 588113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512188" comment="gzip-1.6-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0003" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0003" ref_url="https://www.suse.com/security/cve/CVE-2010-0003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0003/">CVE-2010-0003</cve>
	<bugzilla href="https://bugzilla.suse.com/569902">SUSE bug 569902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0007" ref_url="https://www.suse.com/security/cve/CVE-2010-0007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" source="SUSE-SU"/>
    <description>
    net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0007/">CVE-2010-0007</cve>
	<bugzilla href="https://bugzilla.suse.com/570602">SUSE bug 570602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570606">SUSE bug 570606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0013" ref_url="https://www.suse.com/security/cve/CVE-2010-0013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00052.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122.  NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0013/">CVE-2010-0013</cve>
	<bugzilla href="https://bugzilla.suse.com/567799">SUSE bug 567799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569616">SUSE bug 569616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581201">SUSE bug 581201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0164" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the imgContainer::InternalAddFrameHelper function in src/imgContainer.cpp in libpr0n in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace animation in which the frames have different bits-per-pixel (bpp) values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165" source="SUSE CVE"/>
    <description>
    The TraceRecorder::traverseScopeChain function in js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors involving certain indirect calls to the JavaScript eval function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0166" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166" source="SUSE CVE"/>
    <description>
    The gfxTextRun::SanitizeGlyphRuns function in gfx/thebes/src/gfxFont.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 on Mac OS X, when the Core Text API is used, does not properly perform certain deletions, which allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via an HTML document containing invisible Unicode characters, as demonstrated by the U+FEFF, U+FFF9, U+FFFA, and U+FFFB characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0167" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167" source="SUSE CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors related to (1) layout/generic/nsBlockFrame.cpp and (2) the _evaluate function in modules/plugin/base/src/nsNPAPIPlugin.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0168" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168" source="SUSE CVE"/>
    <description>
    The nsDocument::MaybePreLoadImage function in content/base/src/nsDocument.cpp in the image-preloading implementation in Mozilla Firefox 3.6 before 3.6.2 does not apply scheme restrictions and policy restrictions to the image's URL, which might allow remote attackers to cause a denial of service (application crash or hang) or hijack the functionality of the browser's add-ons via a crafted SRC attribute of an IMG element, as demonstrated by remote command execution through an ssh: URL in a configuration that supports gnome-vfs with a nonstandard network.gnomevfs.supported-protocols setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169" source="SUSE CVE"/>
    <description>
    The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser's font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0170" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170" source="SUSE CVE"/>
    <description>
    Mozilla Firefox 3.6 before 3.6.2 does not offer plugins the expected window.location protection mechanism, which might allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors that are specific to each affected plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171" source="SUSE CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0172" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172" source="SUSE CVE"/>
    <description>
    toolkit/components/passwordmgr/src/nsLoginManagerPrompter.js in the asynchronous Authorization Prompt implementation in Mozilla Firefox 3.6 before 3.6.2 does not properly handle concurrent authorization requests from multiple web sites, which might allow remote web servers to spoof an authorization dialog and capture credentials by demanding HTTP authentication in opportunistic circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0186" ref_url="https://www.suse.com/security/cve/CVE-2010-0186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0130-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Cross-domain vulnerability in Adobe Flash Player before 10.0.45.2, Adobe AIR before 1.5.3.9130, and Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows remote attackers to bypass intended sandbox restrictions and make cross-domain requests via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0186/">CVE-2010-0186</cve>
	<bugzilla href="https://bugzilla.suse.com/578997">SUSE bug 578997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580470">SUSE bug 580470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0187" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0187" ref_url="https://www.suse.com/security/cve/CVE-2010-0187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.0.45.2 and Adobe AIR before 1.5.3.9130 allow remote attackers to cause a denial of service (application crash) via a modified SWF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0187/">CVE-2010-0187</cve>
	<bugzilla href="https://bugzilla.suse.com/578997">SUSE bug 578997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0209" ref_url="https://www.suse.com/security/cve/CVE-2010-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:034" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2213, CVE-2010-2214, and CVE-2010-2216.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0209/">CVE-2010-0209</cve>
	<bugzilla href="https://bugzilla.suse.com/630108">SUSE bug 630108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0277" ref_url="https://www.suse.com/security/cve/CVE-2010-0277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00052.html" source="SUSE-SU"/>
    <description>
    slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0277/">CVE-2010-0277</cve>
	<bugzilla href="https://bugzilla.suse.com/567799">SUSE bug 567799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569616">SUSE bug 569616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581201">SUSE bug 581201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00008.html" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283</cve>
	<bugzilla href="https://bugzilla.suse.com/571781">SUSE bug 571781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576524">SUSE bug 576524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0684-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00058.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<bugzilla href="https://bugzilla.suse.com/636978">SUSE bug 636978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646682">SUSE bug 646682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141231" comment="bzip2-1.0.6-27.1129 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141232" comment="libbz2-1-1.0.6-27.1129 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141233" comment="libbz2-1-32bit-1.0.6-27.1129 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141231" comment="bzip2-1.0.6-27.1129 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141235" comment="clamav-0.98.4-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141232" comment="libbz2-1-1.0.6-27.1129 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141233" comment="libbz2-1-32bit-1.0.6-27.1129 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<bugzilla href="https://bugzilla.suse.com/609317">SUSE bug 609317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641823">SUSE bug 641823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140900" comment="libpcsclite1-1.8.10-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141582" comment="libpcsclite1-32bit-1.8.10-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140901" comment="pcsc-lite-1.8.10-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147770" comment="libpcsclite1-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147771" comment="libpcsclite1-32bit-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147772" comment="pcsc-lite-1.8.10-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512377" comment="libpcsclite1-1.8.10-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512378" comment="libpcsclite1-32bit-1.8.10-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512379" comment="pcsc-lite-1.8.10-7.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0420" ref_url="https://www.suse.com/security/cve/CVE-2010-0420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00052.html" source="SUSE-SU"/>
    <description>
    libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing &lt;br&gt; sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0420/">CVE-2010-0420</cve>
	<bugzilla href="https://bugzilla.suse.com/569616">SUSE bug 569616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581201">SUSE bug 581201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0423" ref_url="https://www.suse.com/security/cve/CVE-2010-0423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00052.html" source="SUSE-SU"/>
    <description>
    gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0423/">CVE-2010-0423</cve>
	<bugzilla href="https://bugzilla.suse.com/569616">SUSE bug 569616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581201">SUSE bug 581201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<bugzilla href="https://bugzilla.suse.com/579447">SUSE bug 579447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580800">SUSE bug 580800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/589640">SUSE bug 589640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590353">SUSE bug 590353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141279" comment="cron-4.2-55.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141280" comment="cronie-1.4.11-55.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540" source="SUSE CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671735">SUSE bug 671735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748422">SUSE bug 748422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0541" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00060.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<bugzilla href="https://bugzilla.suse.com/600752">SUSE bug 600752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<bugzilla href="https://bugzilla.suse.com/601352">SUSE bug 601352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657780">SUSE bug 657780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577925">SUSE bug 577925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583536">SUSE bug 583536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597421">SUSE bug 597421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602694">SUSE bug 602694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709819">SUSE bug 709819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00044.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<bugzilla href="https://bugzilla.suse.com/579475">SUSE bug 579475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608034">SUSE bug 608034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102938" comment="cpio-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102939" comment="cpio-lang-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136443" comment="tar-1.27.1-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136445" comment="tar-lang-1.27.1-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102938" comment="cpio-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102939" comment="cpio-lang-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139103" comment="tar-1.27.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139104" comment="tar-lang-1.27.1-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141245" comment="cpio-2.11-26.182 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141246" comment="cpio-lang-2.11-26.182 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141247" comment="tar-1.27.1-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141248" comment="tar-lang-1.27.1-2.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158948" comment="cpio-2.11-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158949" comment="cpio-lang-2.11-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159313" comment="tar-1.27.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159314" comment="tar-lang-1.27.1-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512068" comment="cpio-2.11-36.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512069" comment="cpio-lang-2.11-36.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512622" comment="tar-1.27.1-15.3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512623" comment="tar-lang-1.27.1-15.3.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2 and 1.8 before 1.8.1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid packet that triggers incorrect preparation of an error token.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628</cve>
	<bugzilla href="https://bugzilla.suse.com/582557">SUSE bug 582557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586981">SUSE bug 586981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-4" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<bugzilla href="https://bugzilla.suse.com/583603">SUSE bug 583603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728" source="SUSE CVE"/>
    <description>
    smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<bugzilla href="https://bugzilla.suse.com/586683">SUSE bug 586683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740" source="SUSE CVE"/>
    <description>
    The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<bugzilla href="https://bugzilla.suse.com/590833">SUSE bug 590833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0742" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742" source="SUSE CVE"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
    <description>
    The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<bugzilla href="https://bugzilla.suse.com/610642">SUSE bug 610642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750" source="SUSE CVE"/>
    <description>
    pkexec.c in pkexec in libpolkit in PolicyKit 0.96 allows local users to determine the existence of arbitrary files via the argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750</cve>
	<bugzilla href="https://bugzilla.suse.com/593959">SUSE bug 593959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115371" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115372" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115373" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115376" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141587" comment="libpolkit0-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141588" comment="libpolkit0-32bit-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141589" comment="polkit-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141590" comment="typelib-1_0-Polkit-1_0-0.112-2.189 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<bugzilla href="https://bugzilla.suse.com/550002">SUSE bug 550002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602694">SUSE bug 602694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620680">SUSE bug 620680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
    <description>
    The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597421">SUSE bug 597421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028" source="SUSE CVE"/>
    <description>
    Integer overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1146" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<bugzilla href="https://bugzilla.suse.com/593906">SUSE bug 593906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0050-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00022.html" source="SUSE-SU"/>
    <description>
    The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163</cve>
	<bugzilla href="https://bugzilla.suse.com/594738">SUSE bug 594738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141810" comment="sudo-1.8.10p3-1.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1167" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167" source="SUSE CVE"/>
    <description>
    fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<bugzilla href="https://bugzilla.suse.com/597673">SUSE bug 597673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141329" comment="fetchmail-6.3.26-5.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0371-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00010.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0371-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00010.html" source="SUSE-SU"/>
    <description>
    The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<bugzilla href="https://bugzilla.suse.com/605845">SUSE bug 605845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/634562">SUSE bug 634562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1172" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0969-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0300-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00025.html" source="SUSE-SU"/>
    <description>
    DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633621">SUSE bug 633621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633622">SUSE bug 633622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633623">SUSE bug 633623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633629">SUSE bug 633629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633637">SUSE bug 633637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633639">SUSE bug 633639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633648">SUSE bug 633648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633652">SUSE bug 633652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633653">SUSE bug 633653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633654">SUSE bug 633654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633658">SUSE bug 633658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633660">SUSE bug 633660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633678">SUSE bug 633678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633679">SUSE bug 633679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633681">SUSE bug 633681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633682">SUSE bug 633682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633685">SUSE bug 633685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633686">SUSE bug 633686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633700">SUSE bug 633700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633701">SUSE bug 633701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633702">SUSE bug 633702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-4" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0594-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617866">SUSE bug 617866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639941">SUSE bug 639941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<bugzilla href="https://bugzilla.suse.com/618183">SUSE bug 618183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1207" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 do not properly implement read restrictions for CANVAS elements, which allows remote attackers to obtain sensitive cross-origin information via vectors involving reference retention and node deletion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1210" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1212" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) propagation of deep aborts in the TraceRecorder::record_JSOP_BINDNAME function, (2) depth handling in the TraceRecorder::record_JSOP_GETELEM function, and (3) tracing of out-of-range arguments in the TraceRecorder::record_JSOP_ARGSUB function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-4" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1215" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1297" ref_url="https://www.suse.com/security/cve/CVE-2010-1297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:029" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0359-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1297/">CVE-2010-1297</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612064">SUSE bug 612064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0147-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00026.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x before 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated with (1) renewal or (2) validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320</cve>
	<bugzilla href="https://bugzilla.suse.com/596002">SUSE bug 596002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0292-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0754-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00026.html" source="SUSE-SU"/>
    <description>
    The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<bugzilla href="https://bugzilla.suse.com/596826">SUSE bug 596826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611090">SUSE bug 611090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658525">SUSE bug 658525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663953">SUSE bug 663953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679560">SUSE bug 679560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0709-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322</cve>
	<bugzilla href="https://bugzilla.suse.com/640990">SUSE bug 640990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7008287" ref_url="https://www.suse.com/support/kb/doc/?id=7008287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1053-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00030.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7008287" ref_url="https://www.suse.com/support/kb/doc/?id=7008287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1053-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00030.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324</cve>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1436" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436" source="SUSE CVE"/>
    <description>
    gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436</cve>
	<bugzilla href="https://bugzilla.suse.com/599957">SUSE bug 599957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<bugzilla href="https://bugzilla.suse.com/603251">SUSE bug 603251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1624" ref_url="https://www.suse.com/security/cve/CVE-2010-1624" source="SUSE CVE"/>
    <description>
    The msn_emoticon_msg function in slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.7.0 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a custom emoticon in a malformed SLP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1624/">CVE-2010-1624</cve>
	<bugzilla href="https://bugzilla.suse.com/604225">SUSE bug 604225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1633" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633" source="SUSE CVE"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
    <description>
    RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<bugzilla href="https://bugzilla.suse.com/610642">SUSE bug 610642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1635" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635" source="SUSE CVE"/>
    <description>
    The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<bugzilla href="https://bugzilla.suse.com/605935">SUSE bug 605935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<bugzilla href="https://bugzilla.suse.com/608576">SUSE bug 608576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1642" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642" source="SUSE CVE"/>
    <description>
    The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<bugzilla href="https://bugzilla.suse.com/605935">SUSE bug 605935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0050-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00022.html" source="SUSE-SU"/>
    <description>
    The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646</cve>
	<bugzilla href="https://bugzilla.suse.com/594738">SUSE bug 594738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141810" comment="sudo-1.8.10p3-1.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<bugzilla href="https://bugzilla.suse.com/601352">SUSE bug 601352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604271">SUSE bug 604271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649256">SUSE bug 649256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657780">SUSE bug 657780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<bugzilla href="https://bugzilla.suse.com/611927">SUSE bug 611927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2065" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065" source="SUSE CVE"/>
    <description>
    Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<bugzilla href="https://bugzilla.suse.com/612787">SUSE bug 612787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612879">SUSE bug 612879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<bugzilla href="https://bugzilla.suse.com/612457">SUSE bug 612457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2067" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0387-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0420-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00029.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<bugzilla href="https://bugzilla.suse.com/612787">SUSE bug 612787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612879">SUSE bug 612879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="TID7002558" ref_url="https://www.suse.com/support/kb/doc?id=7002558" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0393-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00019.html" source="SUSE-SU"/>
    <description>
    istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<bugzilla href="https://bugzilla.suse.com/609451">SUSE bug 609451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141157" comment="w3m-0.5.3-157.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141825" comment="w3m-0.5.3-153.145 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2156" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156" source="SUSE CVE"/>
    <description>
    ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156</cve>
	<bugzilla href="https://bugzilla.suse.com/612546">SUSE bug 612546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2160" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2160" ref_url="https://www.suse.com/security/cve/CVE-2010-2160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an invalid offset in an unspecified undocumented opcode in ActionScript Virtual Machine 2, related to getouterscope, a different vulnerability than CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2160/">CVE-2010-2160</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2161" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2161" ref_url="https://www.suse.com/security/cve/CVE-2010-2161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Array index error in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified "types of Adobe Flash code."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2161/">CVE-2010-2161</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2162" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2162" ref_url="https://www.suse.com/security/cve/CVE-2010-2162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors related to improper length calculation and the (1) STSC, (2) STSZ, and (3) STCO atoms.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2162/">CVE-2010-2162</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2163" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2163" ref_url="https://www.suse.com/security/cve/CVE-2010-2163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2163/">CVE-2010-2163</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2164" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2164" ref_url="https://www.suse.com/security/cve/CVE-2010-2164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to an unspecified "image type within a certain function."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2164/">CVE-2010-2164</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2165" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2165" ref_url="https://www.suse.com/security/cve/CVE-2010-2165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2165/">CVE-2010-2165</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2166" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2166" ref_url="https://www.suse.com/security/cve/CVE-2010-2166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2166/">CVE-2010-2166</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2167" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2167" ref_url="https://www.suse.com/security/cve/CVE-2010-2167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to malformed (1) GIF or (2) JPEG data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2167/">CVE-2010-2167</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2169" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2169" ref_url="https://www.suse.com/security/cve/CVE-2010-2169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allow attackers to cause a denial of service (pointer memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2169/">CVE-2010-2169</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2170" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2170" ref_url="https://www.suse.com/security/cve/CVE-2010-2170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2181 and CVE-2010-2183.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2170/">CVE-2010-2170</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2171" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2171" ref_url="https://www.suse.com/security/cve/CVE-2010-2171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors related to SWF files, decompression of embedded JPEG image data, and the DefineBits and other unspecified tags, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2171/">CVE-2010-2171</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2172" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2172" ref_url="https://www.suse.com/security/cve/CVE-2010-2172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player 9 before 9.0.277.0 on unspecified UNIX platforms allows attackers to cause a denial of service via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2172/">CVE-2010-2172</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2173" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2173" ref_url="https://www.suse.com/security/cve/CVE-2010-2173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newclass (0x58) operator, a different vulnerability than CVE-2010-2174.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2173/">CVE-2010-2173</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2174" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2174" ref_url="https://www.suse.com/security/cve/CVE-2010-2174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newfunction (0x44) operator, a different vulnerability than CVE-2010-2173.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2174/">CVE-2010-2174</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2175" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2175" ref_url="https://www.suse.com/security/cve/CVE-2010-2175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2175/">CVE-2010-2175</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2176" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2176" ref_url="https://www.suse.com/security/cve/CVE-2010-2176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2176/">CVE-2010-2176</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2177" ref_url="https://www.suse.com/security/cve/CVE-2010-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2177/">CVE-2010-2177</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2178" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2178" ref_url="https://www.suse.com/security/cve/CVE-2010-2178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2178/">CVE-2010-2178</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2179" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2179" ref_url="https://www.suse.com/security/cve/CVE-2010-2179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when Firefox or Chrome is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to URL parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2179/">CVE-2010-2179</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2180" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2180" ref_url="https://www.suse.com/security/cve/CVE-2010-2180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2180/">CVE-2010-2180</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2181" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2181" ref_url="https://www.suse.com/security/cve/CVE-2010-2181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2183.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2181/">CVE-2010-2181</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2182" ref_url="https://www.suse.com/security/cve/CVE-2010-2182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2182/">CVE-2010-2182</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2183" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2183" ref_url="https://www.suse.com/security/cve/CVE-2010-2183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2181.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2183/">CVE-2010-2183</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2184" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2184" ref_url="https://www.suse.com/security/cve/CVE-2010-2184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2187, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2184/">CVE-2010-2184</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2185" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2185" ref_url="https://www.suse.com/security/cve/CVE-2010-2185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2185/">CVE-2010-2185</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2186" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2186" ref_url="https://www.suse.com/security/cve/CVE-2010-2186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2186/">CVE-2010-2186</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2187" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2187" ref_url="https://www.suse.com/security/cve/CVE-2010-2187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2187/">CVE-2010-2187</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2188" ref_url="https://www.suse.com/security/cve/CVE-2010-2188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:034" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by calling the ActionScript native object 2200 connect method multiple times with different arguments, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2187.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2188/">CVE-2010-2188</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630108">SUSE bug 630108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2189" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2189" ref_url="https://www.suse.com/security/cve/CVE-2010-2189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when used in conjunction with VMWare Tools on a VMWare platform, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2189/">CVE-2010-2189</cve>
	<bugzilla href="https://bugzilla.suse.com/612063">SUSE bug 612063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2213" ref_url="https://www.suse.com/security/cve/CVE-2010-2213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:034" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2214, and CVE-2010-2216.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2213/">CVE-2010-2213</cve>
	<bugzilla href="https://bugzilla.suse.com/630108">SUSE bug 630108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2214" ref_url="https://www.suse.com/security/cve/CVE-2010-2214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:034" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2216.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2214/">CVE-2010-2214</cve>
	<bugzilla href="https://bugzilla.suse.com/630108">SUSE bug 630108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2216" ref_url="https://www.suse.com/security/cve/CVE-2010-2216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:034" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2214.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2216/">CVE-2010-2216</cve>
	<bugzilla href="https://bugzilla.suse.com/630108">SUSE bug 630108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2233" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233" source="SUSE CVE"/>
    <description>
    tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to "downsampled OJPEG input."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<bugzilla href="https://bugzilla.suse.com/612879">SUSE bug 612879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:038" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00064.html" source="SUSE-SU"/>
    <description>
    The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/211997">SUSE bug 211997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546062">SUSE bug 546062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/59807">SUSE bug 59807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615929">SUSE bug 615929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618152">SUSE bug 618152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632737">SUSE bug 632737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643986">SUSE bug 643986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746947">SUSE bug 746947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746949">SUSE bug 746949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141837" comment="xorg-x11-server-7.6_1.15.2-12.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141838" comment="xorg-x11-server-extra-7.6_1.15.2-12.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0625-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00026.html" source="SUSE-SU"/>
    <description>
    Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<bugzilla href="https://bugzilla.suse.com/618155">SUSE bug 618155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2243" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2243" ref_url="https://www.suse.com/security/cve/CVE-2010-2243" source="SUSE CVE"/>
    <description>
    A vulnerability exists in kernel/time/clocksource.c in the Linux kernel before 2.6.34 where on non-GENERIC_TIME systems (GENERIC_TIME=n), accessing /sys/devices/system/clocksource/clocksource0/current_clocksource results in an OOPS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2243/">CVE-2010-2243</cve>
	<bugzilla href="https://bugzilla.suse.com/617903">SUSE bug 617903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2244" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244" source="SUSE CVE"/>
    <description>
    The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244</cve>
	<bugzilla href="https://bugzilla.suse.com/603289">SUSE bug 603289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646961">SUSE bug 646961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141212" comment="avahi-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141213" comment="avahi-lang-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141214" comment="libavahi-client3-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141215" comment="libavahi-client3-32bit-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141216" comment="libavahi-common3-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141217" comment="libavahi-common3-32bit-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141218" comment="libavahi-core7-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141219" comment="libdns_sd-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141220" comment="libdns_sd-32bit-0.6.31-20.59 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2252" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252" source="SUSE CVE"/>
    <description>
    GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252</cve>
	<bugzilla href="https://bugzilla.suse.com/606317">SUSE bug 606317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102008" comment="wget-1.14-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141826" comment="wget-1.14-4.83 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2494" ref_url="https://www.suse.com/security/cve/CVE-2010-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple buffer underflows in the base64 decoder in base64.c in (1) bogofilter and (2) bogolexer in bogofilter before 1.2.2 allow remote attackers to cause a denial of service (heap memory corruption and application crash) via an e-mail message with invalid base64 data that begins with an = (equals) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2494/">CVE-2010-2494</cve>
	<bugzilla href="https://bugzilla.suse.com/619847">SUSE bug 619847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131108" comment="bogofilter-1.2.4-5.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141230" comment="bogofilter-1.2.4-3.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00060.html" source="SUSE-SU"/>
    <description>
    Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<bugzilla href="https://bugzilla.suse.com/619562">SUSE bug 619562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The mipv6 daemon in UMIP 0.4 does not verify that netlink messages originated in the kernel, which allows local users to spoof netlink socket communication via a crafted unicast message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in ha.c in the mipv6 daemon in UMIP 0.4 allow remote attackers to have an unspecified impact via a crafted (1) ND_OPT_PREFIX_INFORMATION or (2) ND_OPT_HOME_AGENT_INFO packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2528" ref_url="https://www.suse.com/security/cve/CVE-2010-2528" source="SUSE CVE"/>
    <description>
    The clientautoresp function in family_icbm.c in the oscar protocol plugin in libpurple in Pidgin before 2.7.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via an X-Status message that lacks the expected end tag for a (1) desc or (2) title element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2528/">CVE-2010-2528</cve>
	<bugzilla href="https://bugzilla.suse.com/630965">SUSE bug 630965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2529" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in ping.c in iputils 20020927, 20070202, 20071127, and 20100214 on Mandriva Linux allows remote attackers to cause a denial of service (hang) via a crafted echo response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<bugzilla href="https://bugzilla.suse.com/620837">SUSE bug 620837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2546" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2546" ref_url="https://www.suse.com/security/cve/CVE-2010-2546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004100.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in loaders/load_it.c in libmikmod, possibly 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file, related to panpts, pitpts, and IT_ProcessEnvelope.  NOTE: some of these details are obtained from third party information.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3995.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2546/">CVE-2010-2546</cve>
	<bugzilla href="https://bugzilla.suse.com/625547">SUSE bug 625547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752802">SUSE bug 752802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0479-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<bugzilla href="https://bugzilla.suse.com/625947">SUSE bug 625947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141412" comment="gpg2-2.0.24-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141413" comment="gpg2-lang-2.0.24-1.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159008" comment="gpg2-2.0.24-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159009" comment="gpg2-lang-2.0.24-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512180" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512181" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00019.html" source="SUSE-SU"/>
    <description>
    Array index error in the PK font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142092" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142093" comment="typelib-1_0-EvinceView-3_0-3.20.1-5.66 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141319" comment="evince-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141320" comment="evince-lang-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141321" comment="libevdocument3-4-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141322" comment="libevview3-3-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141323" comment="typelib-1_0-EvinceDocument-3_0-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141324" comment="typelib-1_0-EvinceView-3_0-3.10.3-1.213 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174438" comment="evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174439" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174440" comment="evince-lang-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174441" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174442" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174443" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174444" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174445" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174446" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174447" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174448" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174449" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174450" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174451" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.22.9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00019.html" source="SUSE-SU"/>
    <description>
    Array index error in the VF font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142092" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142093" comment="typelib-1_0-EvinceView-3_0-3.20.1-5.66 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141319" comment="evince-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141320" comment="evince-lang-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141321" comment="libevdocument3-4-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141322" comment="libevview3-3-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141323" comment="typelib-1_0-EvinceDocument-3_0-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141324" comment="typelib-1_0-EvinceView-3_0-3.10.3-1.213 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174438" comment="evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174439" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174440" comment="evince-lang-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174441" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174442" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174443" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174444" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174445" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174446" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174447" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174448" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174449" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174450" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174451" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.22.9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0140-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661018">SUSE bug 661018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662411">SUSE bug 662411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/664484">SUSE bug 664484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790421">SUSE bug 790421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142092" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142093" comment="typelib-1_0-EvinceView-3_0-3.20.1-5.66 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141319" comment="evince-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141320" comment="evince-lang-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141321" comment="libevdocument3-4-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141322" comment="libevview3-3-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141323" comment="typelib-1_0-EvinceDocument-3_0-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141324" comment="typelib-1_0-EvinceView-3_0-3.10.3-1.213 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174438" comment="evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174439" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174440" comment="evince-lang-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174441" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174442" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174443" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174444" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174445" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174446" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174447" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174448" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174449" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174450" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174451" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.22.9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00019.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the TFM font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142092" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142093" comment="typelib-1_0-EvinceView-3_0-3.20.1-5.66 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141319" comment="evince-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141320" comment="evince-lang-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141321" comment="libevdocument3-4-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141322" comment="libevview3-3-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141323" comment="typelib-1_0-EvinceDocument-3_0-3.10.3-1.213 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141324" comment="typelib-1_0-EvinceView-3_0-3.10.3-1.213 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174438" comment="evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174439" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174440" comment="evince-lang-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174441" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174442" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174443" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174444" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174445" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174446" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174447" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174448" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174449" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174450" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174451" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.22.9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-4" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2755" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0064-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657731">SUSE bug 657731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669245">SUSE bug 669245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141769" comment="perl-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141770" comment="perl-32bit-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141771" comment="perl-base-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141772" comment="perl-doc-5.18.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000908.html" source="SUSE-SU"/>
    <description>
    The MS-ZIP decompressor in cabextract before 1.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed MSZIP archive in a .cab file during a (1) test or (2) extract action, related to the libmspack library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/627753">SUSE bug 627753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107709" comment="libmspack0-0.4-10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141564" comment="libmspack0-0.4-3.64 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2801" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000908.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the Quantum decompressor in cabextract before 1.3, when archive test mode is used, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Quantum archive in a .cab file, related to the libmspack library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<bugzilla href="https://bugzilla.suse.com/627753">SUSE bug 627753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107709" comment="libmspack0-0.4-10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141564" comment="libmspack0-0.4-3.64 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00060.html" source="SUSE-SU"/>
    <description>
    The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/629447">SUSE bug 629447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2884" ref_url="https://www.suse.com/security/cve/CVE-2010-2884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:042" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0706-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2884/">CVE-2010-2884</cve>
	<bugzilla href="https://bugzilla.suse.com/638466">SUSE bug 638466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639541">SUSE bug 639541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2891" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<bugzilla href="https://bugzilla.suse.com/649867">SUSE bug 649867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2935" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00041.html" source="SUSE-SU"/>
    <description>
    simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<bugzilla href="https://bugzilla.suse.com/629085">SUSE bug 629085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141630" comment="libreoffice-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141631" comment="libreoffice-base-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141632" comment="libreoffice-base-drivers-mysql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141633" comment="libreoffice-base-drivers-postgresql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141634" comment="libreoffice-calc-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141635" comment="libreoffice-calc-extensions-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141636" comment="libreoffice-draw-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141637" comment="libreoffice-filters-optional-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141638" comment="libreoffice-gnome-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141639" comment="libreoffice-icon-theme-tango-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141640" comment="libreoffice-impress-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141641" comment="libreoffice-l10n-af-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141642" comment="libreoffice-l10n-ar-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141643" comment="libreoffice-l10n-ca-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141644" comment="libreoffice-l10n-cs-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141645" comment="libreoffice-l10n-da-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141646" comment="libreoffice-l10n-de-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141647" comment="libreoffice-l10n-en-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141648" comment="libreoffice-l10n-es-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141649" comment="libreoffice-l10n-fi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141650" comment="libreoffice-l10n-fr-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141651" comment="libreoffice-l10n-gu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141652" comment="libreoffice-l10n-hi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141653" comment="libreoffice-l10n-hu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141654" comment="libreoffice-l10n-it-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141655" comment="libreoffice-l10n-ja-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141656" comment="libreoffice-l10n-ko-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141657" comment="libreoffice-l10n-nb-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141658" comment="libreoffice-l10n-nl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141659" comment="libreoffice-l10n-nn-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141660" comment="libreoffice-l10n-pl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141661" comment="libreoffice-l10n-pt-BR-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141662" comment="libreoffice-l10n-pt-PT-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141663" comment="libreoffice-l10n-ru-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141664" comment="libreoffice-l10n-sk-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141665" comment="libreoffice-l10n-sv-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141666" comment="libreoffice-l10n-xh-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141667" comment="libreoffice-l10n-zh-Hans-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141668" comment="libreoffice-l10n-zh-Hant-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141669" comment="libreoffice-l10n-zu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141670" comment="libreoffice-mailmerge-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141671" comment="libreoffice-math-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141672" comment="libreoffice-officebean-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141673" comment="libreoffice-pyuno-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141674" comment="libreoffice-writer-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141675" comment="libreoffice-writer-extensions-4.3.1.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2936" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00041.html" source="SUSE-SU"/>
    <description>
    Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<bugzilla href="https://bugzilla.suse.com/629085">SUSE bug 629085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141630" comment="libreoffice-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141631" comment="libreoffice-base-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141632" comment="libreoffice-base-drivers-mysql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141633" comment="libreoffice-base-drivers-postgresql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141634" comment="libreoffice-calc-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141635" comment="libreoffice-calc-extensions-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141636" comment="libreoffice-draw-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141637" comment="libreoffice-filters-optional-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141638" comment="libreoffice-gnome-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141639" comment="libreoffice-icon-theme-tango-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141640" comment="libreoffice-impress-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141641" comment="libreoffice-l10n-af-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141642" comment="libreoffice-l10n-ar-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141643" comment="libreoffice-l10n-ca-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141644" comment="libreoffice-l10n-cs-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141645" comment="libreoffice-l10n-da-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141646" comment="libreoffice-l10n-de-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141647" comment="libreoffice-l10n-en-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141648" comment="libreoffice-l10n-es-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141649" comment="libreoffice-l10n-fi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141650" comment="libreoffice-l10n-fr-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141651" comment="libreoffice-l10n-gu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141652" comment="libreoffice-l10n-hi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141653" comment="libreoffice-l10n-hu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141654" comment="libreoffice-l10n-it-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141655" comment="libreoffice-l10n-ja-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141656" comment="libreoffice-l10n-ko-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141657" comment="libreoffice-l10n-nb-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141658" comment="libreoffice-l10n-nl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141659" comment="libreoffice-l10n-nn-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141660" comment="libreoffice-l10n-pl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141661" comment="libreoffice-l10n-pt-BR-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141662" comment="libreoffice-l10n-pt-PT-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141663" comment="libreoffice-l10n-ru-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141664" comment="libreoffice-l10n-sk-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141665" comment="libreoffice-l10n-sv-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141666" comment="libreoffice-l10n-xh-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141667" comment="libreoffice-l10n-zh-Hans-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141668" comment="libreoffice-l10n-zh-Hant-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141669" comment="libreoffice-l10n-zu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141670" comment="libreoffice-mailmerge-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141671" comment="libreoffice-math-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141672" comment="libreoffice-officebean-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141673" comment="libreoffice-pyuno-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141674" comment="libreoffice-writer-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141675" comment="libreoffice-writer-extensions-4.3.1.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0952-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00008.html" source="SUSE-SU"/>
    <description>
    ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<bugzilla href="https://bugzilla.suse.com/649256">SUSE bug 649256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654627">SUSE bug 654627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<bugzilla href="https://bugzilla.suse.com/632309">SUSE bug 632309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642324">SUSE bug 642324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0723-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<bugzilla href="https://bugzilla.suse.com/631582">SUSE bug 631582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<bugzilla href="https://bugzilla.suse.com/636112">SUSE bug 636112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<bugzilla href="https://bugzilla.suse.com/635413">SUSE bug 635413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<bugzilla href="https://bugzilla.suse.com/630599">SUSE bug 630599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00015.html" source="SUSE-SU"/>
    <description>
    bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<bugzilla href="https://bugzilla.suse.com/633938">SUSE bug 633938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<bugzilla href="https://bugzilla.suse.com/633943">SUSE bug 633943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0653-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0658-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0659-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00044.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<bugzilla href="https://bugzilla.suse.com/637218">SUSE bug 637218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<bugzilla href="https://bugzilla.suse.com/639709">SUSE bug 639709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641575">SUSE bug 641575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0904-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<bugzilla href="https://bugzilla.suse.com/637290">SUSE bug 637290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<bugzilla href="https://bugzilla.suse.com/642502">SUSE bug 642502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<bugzilla href="https://bugzilla.suse.com/639481">SUSE bug 639481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<bugzilla href="https://bugzilla.suse.com/639482">SUSE bug 639482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<bugzilla href="https://bugzilla.suse.com/639483">SUSE bug 639483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
    <description>
    The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<bugzilla href="https://bugzilla.suse.com/639708">SUSE bug 639708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:051" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00023.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<bugzilla href="https://bugzilla.suse.com/640721">SUSE bug 640721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641580">SUSE bug 641580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3430" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430" source="SUSE CVE"/>
    <description>
    The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430</cve>
	<bugzilla href="https://bugzilla.suse.com/623457">SUSE bug 623457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/631802">SUSE bug 631802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141764" comment="pam-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141765" comment="pam-32bit-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141766" comment="pam-doc-1.1.8-11.57 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512585" comment="pam-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512586" comment="pam-32bit-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512587" comment="pam-doc-1.1.8-24.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3431" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431" source="SUSE CVE"/>
    <description>
    The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431</cve>
	<bugzilla href="https://bugzilla.suse.com/623457">SUSE bug 623457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141764" comment="pam-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141765" comment="pam-32bit-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141766" comment="pam-doc-1.1.8-11.57 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512585" comment="pam-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512586" comment="pam-32bit-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512587" comment="pam-doc-1.1.8-24.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0903-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00034.html" source="SUSE-SU"/>
    <description>
    The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<bugzilla href="https://bugzilla.suse.com/643771">SUSE bug 643771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<bugzilla href="https://bugzilla.suse.com/643078">SUSE bug 643078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2010:0992-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00039.html" source="SUSE-SU"/>
    <description>
    The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<bugzilla href="https://bugzilla.suse.com/642571">SUSE bug 642571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131123" comment="openslp-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131124" comment="openslp-32bit-2.0.0-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131298" comment="openslp-2.0.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131299" comment="openslp-32bit-2.0.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141760" comment="openslp-2.0.0-2.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141761" comment="openslp-32bit-2.0.0-2.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142041" comment="openslp-2.0.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142042" comment="openslp-32bit-2.0.0-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512581" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512582" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-test-2010:36899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00006.html" source="SUSE-SU"/>
    <description>
    ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611</cve>
	<bugzilla href="https://bugzilla.suse.com/650902">SUSE bug 650902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667655">SUSE bug 667655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2010:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00018.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613</cve>
	<bugzilla href="https://bugzilla.suse.com/657129">SUSE bug 657129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2010:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00018.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614</cve>
	<bugzilla href="https://bugzilla.suse.com/657102">SUSE bug 657102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615" source="SUSE CVE"/>
    <description>
    named in ISC BIND 9.7.2-P2 does not check all intended locations for allow-query ACLs, which might allow remote attackers to make successful requests for private DNS records via the standard DNS query mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615</cve>
	<bugzilla href="https://bugzilla.suse.com/657120">SUSE bug 657120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3616" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616" source="SUSE CVE"/>
    <description>
    ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616</cve>
	<bugzilla href="https://bugzilla.suse.com/659059">SUSE bug 659059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3654" ref_url="https://www.suse.com/security/cve/CVE-2010-3654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:055" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:058" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-test-2010:36965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00005.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3654/">CVE-2010-3654</cve>
	<bugzilla href="https://bugzilla.suse.com/650145">SUSE bug 650145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651232">SUSE bug 651232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656765">SUSE bug 656765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3698" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3698" ref_url="https://www.suse.com/security/cve/CVE-2010-3698" source="SUSE CVE"/>
    <description>
    The KVM implementation in the Linux kernel before 2.6.36 does not properly reload the FS and GS segment registers, which allows host OS users to cause a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified Local Descriptor Table (LDT).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3698/">CVE-2010-3698</cve>
	<bugzilla href="https://bugzilla.suse.com/1161450">SUSE bug 1161450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3711" ref_url="https://www.suse.com/security/cve/CVE-2010-3711" source="SUSE CVE"/>
    <description>
    libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3711/">CVE-2010-3711</cve>
	<bugzilla href="https://bugzilla.suse.com/648273">SUSE bug 648273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<bugzilla href="https://bugzilla.suse.com/649492">SUSE bug 649492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0361-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00057.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<bugzilla href="https://bugzilla.suse.com/647375">SUSE bug 647375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689174">SUSE bug 689174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3853" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853" source="SUSE CVE"/>
    <description>
    pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853</cve>
	<bugzilla href="https://bugzilla.suse.com/647958">SUSE bug 647958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141764" comment="pam-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141765" comment="pam-32bit-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141766" comment="pam-doc-1.1.8-11.57 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512585" comment="pam-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512586" comment="pam-32bit-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512587" comment="pam-doc-1.1.8-24.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0361-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00057.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<bugzilla href="https://bugzilla.suse.com/647375">SUSE bug 647375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689174">SUSE bug 689174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0965-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00030.html" source="SUSE-SU"/>
    <description>
    Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651003">SUSE bug 651003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000" source="SUSE CVE"/>
    <description>
    gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000</cve>
	<bugzilla href="https://bugzilla.suse.com/642827">SUSE bug 642827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140640" comment="gnome-shell-3.20.4-70.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140641" comment="gnome-shell-browser-plugin-3.20.4-70.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142112" comment="gnome-shell-calendar-3.20.4-70.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140642" comment="gnome-shell-lang-3.20.4-70.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141405" comment="gnome-shell-3.10.4-22.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141406" comment="gnome-shell-browser-plugin-3.10.4-22.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141407" comment="gnome-shell-calendar-3.10.4-22.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141408" comment="gnome-shell-lang-3.10.4-22.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141882" comment="gnome-shell-3.10.4-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141883" comment="gnome-shell-browser-plugin-3.10.4-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141884" comment="gnome-shell-calendar-3.10.4-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141885" comment="gnome-shell-lang-3.10.4-40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159001" comment="gnome-shell-3.20.4-76.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159002" comment="gnome-shell-browser-plugin-3.20.4-76.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159645" comment="gnome-shell-calendar-3.20.4-76.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159003" comment="gnome-shell-lang-3.20.4-76.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512168" comment="gnome-shell-3.20.4-77.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512169" comment="gnome-shell-browser-plugin-3.20.4-77.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512170" comment="gnome-shell-calendar-3.20.4-77.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512171" comment="gnome-shell-lang-3.20.4-77.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7008287" ref_url="https://www.suse.com/support/kb/doc/?id=7008287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1053-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00030.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020</cve>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7008287" ref_url="https://www.suse.com/support/kb/doc/?id=7008287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1053-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00030.html" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021</cve>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7008007" ref_url="https://www.suse.com/support/kb/doc/?id=7008007" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022</cve>
	<bugzilla href="https://bugzilla.suse.com/662665">SUSE bug 662665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0014-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00032.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<bugzilla href="https://bugzilla.suse.com/657663">SUSE bug 657663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674017">SUSE bug 674017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711693">SUSE bug 711693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724729">SUSE bug 724729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799454">SUSE bug 799454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4252" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252" source="SUSE CVE"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
    <description>
    OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<bugzilla href="https://bugzilla.suse.com/657663">SUSE bug 657663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711693">SUSE bug 711693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724729">SUSE bug 724729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0068-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the hpmud_get_pml function in io/hpmud/pml.c in Hewlett-Packard Linux Imaging and Printing (HPLIP) 1.6.7, 3.9.8, 3.10.9, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<bugzilla href="https://bugzilla.suse.com/336658">SUSE bug 336658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<bugzilla href="https://bugzilla.suse.com/655448">SUSE bug 655448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<bugzilla href="https://bugzilla.suse.com/655448">SUSE bug 655448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4341" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0058-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00025.html" source="SUSE-SU"/>
    <description>
    The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<bugzilla href="https://bugzilla.suse.com/660481">SUSE bug 660481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141537" comment="libipa_hbac0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141538" comment="libsss_idmap0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141539" comment="python-sssd-config-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141540" comment="sssd-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141541" comment="sssd-32bit-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141542" comment="sssd-ad-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141543" comment="sssd-ipa-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141544" comment="sssd-krb5-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141545" comment="sssd-krb5-common-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141546" comment="sssd-ldap-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141547" comment="sssd-proxy-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141548" comment="sssd-tools-1.11.5.1-5.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141980" comment="libipa_hbac0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141981" comment="libsss_idmap0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141982" comment="libsss_sudo-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141983" comment="python-sssd-config-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141984" comment="sssd-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141985" comment="sssd-32bit-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141986" comment="sssd-ad-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141987" comment="sssd-ipa-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141988" comment="sssd-krb5-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141989" comment="sssd-krb5-common-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141990" comment="sssd-ldap-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141991" comment="sssd-proxy-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141992" comment="sssd-tools-1.11.5.1-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159140" comment="libipa_hbac0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159141" comment="libsss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159142" comment="libsss_nss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159143" comment="libsss_sudo-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159144" comment="python-sssd-config-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159145" comment="sssd-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159146" comment="sssd-32bit-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159147" comment="sssd-ad-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159148" comment="sssd-ipa-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159149" comment="sssd-krb5-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159150" comment="sssd-krb5-common-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159151" comment="sssd-ldap-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159152" comment="sssd-proxy-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159153" comment="sssd-tools-1.13.4-33.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512322" comment="libipa_hbac0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512323" comment="libsss_certmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512324" comment="libsss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512325" comment="libsss_nss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512326" comment="libsss_simpleifp0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166514" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512327" comment="python-sssd-config-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512328" comment="sssd-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512329" comment="sssd-32bit-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512330" comment="sssd-ad-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512331" comment="sssd-ipa-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512332" comment="sssd-krb5-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512333" comment="sssd-krb5-common-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512334" comment="sssd-ldap-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512335" comment="sssd-proxy-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512336" comment="sssd-tools-1.16.1-2.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0401-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<bugzilla href="https://bugzilla.suse.com/659934">SUSE bug 659934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0083-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00032.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/660127">SUSE bug 660127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141769" comment="perl-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141770" comment="perl-32bit-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141771" comment="perl-base-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141772" comment="perl-doc-5.18.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0083-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657731">SUSE bug 657731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669245">SUSE bug 669245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141769" comment="perl-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141770" comment="perl-32bit-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141771" comment="perl-base-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141772" comment="perl-doc-5.18.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00036.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661471">SUSE bug 661471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4523" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0049-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<bugzilla href="https://bugzilla.suse.com/660109">SUSE bug 660109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4530" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Signedness error in ccid_serial.c in libccid in the USB Chip/Smart Card Interface Devices (CCID) driver, as used in pcscd in PCSC-Lite 1.5.3 and possibly other products, allows physically proximate attackers to execute arbitrary code via a smart card with a crafted serial number that causes a negative value to be used in a memcpy operation, which triggers a buffer overflow.  NOTE: some sources refer to this issue as an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<bugzilla href="https://bugzilla.suse.com/661000">SUSE bug 661000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141065" comment="pcsc-ccid-1.4.14-1.45 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159258" comment="pcsc-ccid-1.4.25-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<bugzilla href="https://bugzilla.suse.com/661000">SUSE bug 661000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140900" comment="libpcsclite1-1.8.10-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141582" comment="libpcsclite1-32bit-1.8.10-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140901" comment="pcsc-lite-1.8.10-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147770" comment="libpcsclite1-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147771" comment="libpcsclite1-32bit-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147772" comment="pcsc-lite-1.8.10-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512377" comment="libpcsclite1-1.8.10-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512378" comment="libpcsclite1-32bit-1.8.10-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512379" comment="pcsc-lite-1.8.10-7.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/662029">SUSE bug 662029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4540" ref_url="https://www.suse.com/security/cve/CVE-2010-4540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS &gt; LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4540/">CVE-2010-4540</cve>
	<bugzilla href="https://bugzilla.suse.com/662043">SUSE bug 662043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4541" ref_url="https://www.suse.com/security/cve/CVE-2010-4541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4541/">CVE-2010-4541</cve>
	<bugzilla href="https://bugzilla.suse.com/662043">SUSE bug 662043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4542" ref_url="https://www.suse.com/security/cve/CVE-2010-4542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4542/">CVE-2010-4542</cve>
	<bugzilla href="https://bugzilla.suse.com/662043">SUSE bug 662043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4543" ref_url="https://www.suse.com/security/cve/CVE-2010-4543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4543/">CVE-2010-4543</cve>
	<bugzilla href="https://bugzilla.suse.com/662043">SUSE bug 662043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692877">SUSE bug 692877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4565" ref_url="https://www.suse.com/security/cve/CVE-2010-4565" source="SUSE CVE"/>
    <description>
    The bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel 2.6.36 and earlier creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-4565/">CVE-2010-4565</cve>
	<bugzilla href="https://bugzilla.suse.com/1161355">SUSE bug 1161355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651218">SUSE bug 651218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<bugzilla href="https://bugzilla.suse.com/1093615">SUSE bug 1093615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141768" comment="patch-2.7.1-5.191 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175223" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4665" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0409-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00079.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<bugzilla href="https://bugzilla.suse.com/687442">SUSE bug 687442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4777" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0479-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00025.html" source="SUSE-SU"/>
    <description>
    The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141769" comment="perl-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141770" comment="perl-32bit-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141771" comment="perl-base-5.18.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141772" comment="perl-doc-5.18.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0592-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<bugzilla href="https://bugzilla.suse.com/873351">SUSE bug 873351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5313" ref_url="https://www.suse.com/security/cve/CVE-2010-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5313/">CVE-2010-5313</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5325" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5325" ref_url="https://www.suse.com/security/cve/CVE-2010-5325" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5325/">CVE-2010-5325</cve>
	<bugzilla href="https://bugzilla.suse.com/966830">SUSE bug 966830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338824" comment="cups-filters is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5328" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5328" ref_url="https://www.suse.com/security/cve/CVE-2010-5328" source="SUSE CVE"/>
    <description>
    include/linux/init_task.h in the Linux kernel before 2.6.35 does not prevent signals with a process group ID of zero from reaching the swapper process, which allows local users to cause a denial of service (system crash) by leveraging access to this process group.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-5328/">CVE-2010-5328</cve>
	<bugzilla href="https://bugzilla.suse.com/1021109">SUSE bug 1021109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5329" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5329" ref_url="https://www.suse.com/security/cve/CVE-2010-5329" source="SUSE CVE"/>
    <description>
    The video_usercopy function in drivers/media/video/v4l2-ioctl.c in the Linux kernel before 2.6.39 relies on the count value of a v4l2_ext_controls data structure to determine a kmalloc size, which might allow local users to cause a denial of service (memory consumption) via a large value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5329/">CVE-2010-5329</cve>
	<bugzilla href="https://bugzilla.suse.com/1035719">SUSE bug 1035719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5331" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5331" ref_url="https://www.suse.com/security/cve/CVE-2010-5331" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem. NOTE: At least one Linux maintainer believes that this CVE is incorrectly assigned and should be rejected because the value is hard coded and are not user-controllable where it is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-5331/">CVE-2010-5331</cve>
	<bugzilla href="https://bugzilla.suse.com/1143173">SUSE bug 1143173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5332" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5332" ref_url="https://www.suse.com/security/cve/CVE-2010-5332" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-5332/">CVE-2010-5332</cve>
	<bugzilla href="https://bugzilla.suse.com/1143170">SUSE bug 1143170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0050-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00022.html" source="SUSE-SU"/>
    <description>
    check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010</cve>
	<bugzilla href="https://bugzilla.suse.com/663881">SUSE bug 663881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141810" comment="sudo-1.8.10p3-1.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0014" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-403" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00022.html" source="SUSE-SU"/>
    <description>
    ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<bugzilla href="https://bugzilla.suse.com/670526">SUSE bug 670526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0221-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00019.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<bugzilla href="https://bugzilla.suse.com/666101">SUSE bug 666101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141577" comment="libpango-1_0-0-1.36.3-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141578" comment="libpango-1_0-0-32bit-1.36.3-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141579" comment="pango-modules-1.36.3-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141580" comment="pango-modules-32bit-1.36.3-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141581" comment="typelib-1_0-Pango-1_0-1.36.3-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0024" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<bugzilla href="https://bugzilla.suse.com/683335">SUSE bug 683335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0064" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0221-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00019.html" source="SUSE-SU"/>
    <description>
    The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<bugzilla href="https://bugzilla.suse.com/666101">SUSE bug 666101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672502">SUSE bug 672502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141577" comment="libpango-1_0-0-1.36.3-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141578" comment="libpango-1_0-0-32bit-1.36.3-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141579" comment="pango-modules-1.36.3-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141580" comment="pango-modules-32bit-1.36.3-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141581" comment="typelib-1_0-Pango-1_0-1.36.3-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0068" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0069" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0070" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0069.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0079" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x before 4.0.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to gfx/layers/d3d10/ReadbackManagerD3D10.cpp and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0080" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0081" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.17 and 4.x before 4.0.1, and Thunderbird 3.1.x before 3.1.10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<bugzilla href="https://bugzilla.suse.com/672510">SUSE bug 672510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682053">SUSE bug 682053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682871">SUSE bug 682871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0852-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<bugzilla href="https://bugzilla.suse.com/704612">SUSE bug 704612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728044">SUSE bug 728044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7008008" ref_url="https://www.suse.com/support/kb/doc/?id=7008008" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<bugzilla href="https://bugzilla.suse.com/663619">SUSE bug 663619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7008008" ref_url="https://www.suse.com/support/kb/doc/?id=7008008" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<bugzilla href="https://bugzilla.suse.com/663619">SUSE bug 663619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="TID7008166" ref_url="https://www.suse.com/support/kb/doc/?id=7008166" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284</cve>
	<bugzilla href="https://bugzilla.suse.com/671717">SUSE bug 671717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0348-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00047.html" source="SUSE-SU"/>
    <description>
    The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285</cve>
	<bugzilla href="https://bugzilla.suse.com/687469">SUSE bug 687469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0413" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0098-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413</cve>
	<bugzilla href="https://bugzilla.suse.com/667655">SUSE bug 667655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680298">SUSE bug 680298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0414" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00016.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.7.1 through 9.7.2-P3, when configured as an authoritative server, allows remote attackers to cause a denial of service (deadlock and daemon hang) by sending a query at the time of (1) an IXFR transfer or (2) a DDNS update.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414</cve>
	<bugzilla href="https://bugzilla.suse.com/674431">SUSE bug 674431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0449-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<bugzilla href="https://bugzilla.suse.com/681193">SUSE bug 681193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141753" comment="libzip2-0.11.1-4.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142037" comment="libzip2-0.11.1-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164531" comment="libzip2-0.11.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00053.html" source="SUSE-SU"/>
    <description>
    The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140693" comment="kbd-1.15.5-8.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141422" comment="kbd-1.15.5-7.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141890" comment="kbd-1.15.5-8.4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512194" comment="kbd-2.0.4-8.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512195" comment="kbd-legacy-2.0.4-8.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0171-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00007.html" source="SUSE-SU"/>
    <description>
    /etc/init.d/boot.localfs in the aaa_base package before 11.2-43.48.1 in SUSE openSUSE 11.2, and before 11.3-8.7.1 in openSUSE 11.3, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/mtab.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<bugzilla href="https://bugzilla.suse.com/665479">SUSE bug 665479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140437" comment="aaa_base-13.2+git20140911.61c1681-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140438" comment="aaa_base-extras-13.2+git20140911.61c1681-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141203" comment="aaa_base-13.2+git20140911.61c1681-1.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141204" comment="aaa_base-extras-13.2+git20140911.61c1681-1.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141841" comment="aaa_base-13.2+git20140911.61c1681-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141842" comment="aaa_base-extras-13.2+git20140911.61c1681-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158923" comment="aaa_base-13.2+git20140911.61c1681-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158924" comment="aaa_base-extras-13.2+git20140911.61c1681-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512023" comment="aaa_base-13.2+git20140911.61c1681-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512024" comment="aaa_base-extras-13.2+git20140911.61c1681-38.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0298-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00018.html" source="SUSE-SU"/>
    <description>
    xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<bugzilla href="https://bugzilla.suse.com/674733">SUSE bug 674733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688931">SUSE bug 688931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141834" comment="xorg-x11-7.6_1-14.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141835" comment="xorg-x11-essentials-7.6_1-14.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0523" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0884-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00034.html" source="SUSE-SU"/>
    <description>
    gypsy 0.8 does not properly restrict the files that can be read while running with root privileges, which allows local users to read otherwise restricted files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523</cve>
	<bugzilla href="https://bugzilla.suse.com/666839">SUSE bug 666839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0524" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0884-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00034.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the NMEA parser (nmea-gen.c) in gypsy 0.8 allow local users to cause a denial of service (crash) via unspecified vectors related to the sprintf function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524</cve>
	<bugzilla href="https://bugzilla.suse.com/666839">SUSE bug 666839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0538" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<bugzilla href="https://bugzilla.suse.com/669908">SUSE bug 669908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0264-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0265-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00039.html" source="SUSE-SU"/>
    <description>
    fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<bugzilla href="https://bugzilla.suse.com/668820">SUSE bug 668820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685055">SUSE bug 685055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141346" comment="fuse-2.9.3-3.65 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141347" comment="libfuse2-2.9.3-3.65 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512133" comment="fuse-2.9.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512134" comment="libfuse2-2.9.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0558" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0558" ref_url="https://www.suse.com/security/cve/CVE-2011-0558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code via a large array length value in the ActionScript method of the Function class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0558/">CVE-2011-0558</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0559" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0559" ref_url="https://www.suse.com/security/cve/CVE-2011-0559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted parameters to an unspecified ActionScript method that cause a parameter to be used as an object pointer, a different vulnerability than CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0559/">CVE-2011-0559</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0560" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0560" ref_url="https://www.suse.com/security/cve/CVE-2011-0560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0560/">CVE-2011-0560</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0561" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0561" ref_url="https://www.suse.com/security/cve/CVE-2011-0561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0561/">CVE-2011-0561</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0571" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0571" ref_url="https://www.suse.com/security/cve/CVE-2011-0571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0571/">CVE-2011-0571</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0572" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0572" ref_url="https://www.suse.com/security/cve/CVE-2011-0572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0572/">CVE-2011-0572</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0573" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0573" ref_url="https://www.suse.com/security/cve/CVE-2011-0573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0573/">CVE-2011-0573</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0574" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0574" ref_url="https://www.suse.com/security/cve/CVE-2011-0574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0574/">CVE-2011-0574</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0575" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0575" ref_url="https://www.suse.com/security/cve/CVE-2011-0575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in Adobe Flash Player before 10.2.152.26 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0575/">CVE-2011-0575</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0577" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0577" ref_url="https://www.suse.com/security/cve/CVE-2011-0577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player before 10.2.152.26 allows remote attackers to execute arbitrary code via a crafted font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0577/">CVE-2011-0577</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0578" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0578" ref_url="https://www.suse.com/security/cve/CVE-2011-0578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to a constructor for an unspecified ActionScript3 object and improper type checking, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0607, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0578/">CVE-2011-0578</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0589" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0589" ref_url="https://www.suse.com/security/cve/CVE-2011-0589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0563 and CVE-2011-0606.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0589/">CVE-2011-0589</cve>
	<bugzilla href="https://bugzilla.suse.com/669550">SUSE bug 669550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0607" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0607" ref_url="https://www.suse.com/security/cve/CVE-2011-0607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, and CVE-2011-0608.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0607/">CVE-2011-0607</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0608" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0608" ref_url="https://www.suse.com/security/cve/CVE-2011-0608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0109-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0156-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, and CVE-2011-0607.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0608/">CVE-2011-0608</cve>
	<bugzilla href="https://bugzilla.suse.com/670531">SUSE bug 670531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0609" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0609" ref_url="https://www.suse.com/security/cve/CVE-2011-0609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00031.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0609/">CVE-2011-0609</cve>
	<bugzilla href="https://bugzilla.suse.com/679672">SUSE bug 679672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683367">SUSE bug 683367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0611" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0611" ref_url="https://www.suse.com/security/cve/CVE-2011-0611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0373-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00066.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0611/">CVE-2011-0611</cve>
	<bugzilla href="https://bugzilla.suse.com/686818">SUSE bug 686818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0618" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0618" ref_url="https://www.suse.com/security/cve/CVE-2011-0618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0618/">CVE-2011-0618</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0619" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0619" ref_url="https://www.suse.com/security/cve/CVE-2011-0619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0620, CVE-2011-0621, and CVE-2011-0622.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0619/">CVE-2011-0619</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0620" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0620" ref_url="https://www.suse.com/security/cve/CVE-2011-0620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0619, CVE-2011-0621, and CVE-2011-0622.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0620/">CVE-2011-0620</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0621" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0621" ref_url="https://www.suse.com/security/cve/CVE-2011-0621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0619, CVE-2011-0620, and CVE-2011-0622.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0621/">CVE-2011-0621</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0622" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0622" ref_url="https://www.suse.com/security/cve/CVE-2011-0622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0619, CVE-2011-0620, and CVE-2011-0621.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0622/">CVE-2011-0622</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0623" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0623" ref_url="https://www.suse.com/security/cve/CVE-2011-0623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0624, CVE-2011-0625, and CVE-2011-0626.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0623/">CVE-2011-0623</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0624" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0624" ref_url="https://www.suse.com/security/cve/CVE-2011-0624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0623, CVE-2011-0625, and CVE-2011-0626.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0624/">CVE-2011-0624</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0625" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0625" ref_url="https://www.suse.com/security/cve/CVE-2011-0625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0623, CVE-2011-0624, and CVE-2011-0626.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0625/">CVE-2011-0625</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0626" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0626" ref_url="https://www.suse.com/security/cve/CVE-2011-0626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0623, CVE-2011-0624, and CVE-2011-0625.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0626/">CVE-2011-0626</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0627" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0627" ref_url="https://www.suse.com/security/cve/CVE-2011-0627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0627/">CVE-2011-0627</cve>
	<bugzilla href="https://bugzilla.suse.com/693573">SUSE bug 693573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
    <description>
    The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711</cve>
	<bugzilla href="https://bugzilla.suse.com/672505">SUSE bug 672505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672524">SUSE bug 672524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0712" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<bugzilla href="https://bugzilla.suse.com/672499">SUSE bug 672499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0713" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<bugzilla href="https://bugzilla.suse.com/672916">SUSE bug 672916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0403-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00076.html" source="SUSE-SU"/>
    <description>
    Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<bugzilla href="https://bugzilla.suse.com/670431">SUSE bug 670431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0904" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00027.html" source="SUSE-SU"/>
    <description>
    The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<bugzilla href="https://bugzilla.suse.com/690238">SUSE bug 690238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691207">SUSE bug 691207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691356">SUSE bug 691356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141821" comment="vino-3.10.1-1.86 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141822" comment="vino-lang-3.10.1-1.86 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0905" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00027.html" source="SUSE-SU"/>
    <description>
    The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<bugzilla href="https://bugzilla.suse.com/690238">SUSE bug 690238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691207">SUSE bug 691207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691356">SUSE bug 691356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141821" comment="vino-3.10.1-1.86 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141822" comment="vino-lang-3.10.1-1.86 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0320-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00032.html" source="SUSE-SU"/>
    <description>
    dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<bugzilla href="https://bugzilla.suse.com/675052">SUSE bug 675052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689182">SUSE bug 689182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708527">SUSE bug 708527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715172">SUSE bug 715172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1000" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1000" ref_url="https://www.suse.com/security/cve/CVE-2011-1000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0303-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00021.html" source="SUSE-SU"/>
    <description>
    jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1000/">CVE-2011-1000</cve>
	<bugzilla href="https://bugzilla.suse.com/673257">SUSE bug 673257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141814" comment="telepathy-gabble-0.18.1-3.268 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142152" comment="telepathy-gabble-0.18.3-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1002" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
    <description>
    avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002</cve>
	<bugzilla href="https://bugzilla.suse.com/671797">SUSE bug 671797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141212" comment="avahi-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141213" comment="avahi-lang-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141214" comment="libavahi-client3-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141215" comment="libavahi-client3-32bit-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141216" comment="libavahi-common3-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141217" comment="libavahi-common3-32bit-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141218" comment="libavahi-core7-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141219" comment="libdns_sd-0.6.31-20.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141220" comment="libdns_sd-32bit-0.6.31-20.59 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1004" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00060.html" source="SUSE-SU"/>
    <description>
    The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<bugzilla href="https://bugzilla.suse.com/673740">SUSE bug 673740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1005" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00060.html" source="SUSE-SU"/>
    <description>
    The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<bugzilla href="https://bugzilla.suse.com/673750">SUSE bug 673750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783511">SUSE bug 783511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783525">SUSE bug 783525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880899">SUSE bug 880899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1006" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0316-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application.  NOTE: it is not clear whether this issue crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<bugzilla href="https://bugzilla.suse.com/675506">SUSE bug 675506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140793" comment="libcgroup1-0.41.rc1-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141456" comment="libcgroup1-0.41.rc1-1.30 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159084" comment="libcgroup1-0.41.rc1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1020" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0860-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00003.html" source="SUSE-SU"/>
    <description>
    The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<bugzilla href="https://bugzilla.suse.com/674982">SUSE bug 674982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1022" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0316-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html" source="SUSE-SU"/>
    <description>
    The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<bugzilla href="https://bugzilla.suse.com/675048">SUSE bug 675048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140793" comment="libcgroup1-0.41.rc1-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141456" comment="libcgroup1-0.41.rc1-1.30 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159084" comment="libcgroup1-0.41.rc1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1091" ref_url="https://www.suse.com/security/cve/CVE-2011-1091" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00025.html" source="SUSE-SU"/>
    <description>
    libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1091/">CVE-2011-1091</cve>
	<bugzilla href="https://bugzilla.suse.com/736189">SUSE bug 736189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1097" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0441-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00007.html" source="SUSE-SU"/>
    <description>
    rsync 3.x before 3.0.8, when certain recursion, deletion, and ownership options are used, allows remote rsync servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via malformed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<bugzilla href="https://bugzilla.suse.com/684387">SUSE bug 684387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141801" comment="rsync-3.1.0-2.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1098" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0536-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00055.html" source="SUSE-SU"/>
    <description>
    Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<bugzilla href="https://bugzilla.suse.com/1007000">SUSE bug 1007000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136195">SUSE bug 1136195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677336">SUSE bug 677336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159250" comment="logrotate-3.11.0-1.15 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512572" comment="logrotate-3.11.0-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1138" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<bugzilla href="https://bugzilla.suse.com/678567">SUSE bug 678567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1139" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00046.html" source="SUSE-SU"/>
    <description>
    wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<bugzilla href="https://bugzilla.suse.com/678568">SUSE bug 678568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<bugzilla href="https://bugzilla.suse.com/678569">SUSE bug 678569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1143" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00046.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<bugzilla href="https://bugzilla.suse.com/678571">SUSE bug 678571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1145" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00034.html" source="SUSE-SU"/>
    <description>
    The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<bugzilla href="https://bugzilla.suse.com/678796">SUSE bug 678796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764737">SUSE bug 764737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141151" comment="unixODBC-2.3.4-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141152" comment="unixODBC-32bit-2.3.4-6.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141819" comment="unixODBC-2.3.1-4.95 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141820" comment="unixODBC-32bit-2.3.1-4.95 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512626" comment="unixODBC-2.3.6-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512627" comment="unixODBC-32bit-2.3.6-7.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0311-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0578-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0580-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00066.html" source="SUSE-SU"/>
    <description>
    libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<bugzilla href="https://bugzilla.suse.com/678406">SUSE bug 678406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1154" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0536-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00055.html" source="SUSE-SU"/>
    <description>
    The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679661">SUSE bug 679661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681984">SUSE bug 681984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159250" comment="logrotate-3.11.0-1.15 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512572" comment="logrotate-3.11.0-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1155" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0536-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00055.html" source="SUSE-SU"/>
    <description>
    The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679662">SUSE bug 679662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159250" comment="logrotate-3.11.0-1.15 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512572" comment="logrotate-3.11.0-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1164" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164" source="SUSE CVE"/>
    <description>
    Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164</cve>
	<bugzilla href="https://bugzilla.suse.com/680072">SUSE bug 680072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141821" comment="vino-3.10.1-1.86 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141822" comment="vino-lang-3.10.1-1.86 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0409-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00079.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<bugzilla href="https://bugzilla.suse.com/683337">SUSE bug 683337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1180" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180</cve>
	<bugzilla href="https://bugzilla.suse.com/681497">SUSE bug 681497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1187" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
    <description>
    The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692619">SUSE bug 692619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0412-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00081.html" source="SUSE-SU"/>
    <description>
    Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485</cve>
	<bugzilla href="https://bugzilla.suse.com/1032717">SUSE bug 1032717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688788">SUSE bug 688788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115371" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115372" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115373" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115376" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141587" comment="libpolkit0-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141588" comment="libpolkit0-32bit-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141589" comment="polkit-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141590" comment="typelib-1_0-Polkit-1_0-0.112-2.189 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1488" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1488" ref_url="https://www.suse.com/security/cve/CVE-2011-1488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00033.html" source="SUSE-SU"/>
    <description>
    A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1488/">CVE-2011-1488</cve>
	<bugzilla href="https://bugzilla.suse.com/679030">SUSE bug 679030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681568">SUSE bug 681568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1489" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1489" ref_url="https://www.suse.com/security/cve/CVE-2011-1489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00033.html" source="SUSE-SU"/>
    <description>
    A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1489/">CVE-2011-1489</cve>
	<bugzilla href="https://bugzilla.suse.com/681568">SUSE bug 681568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1490" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1490" ref_url="https://www.suse.com/security/cve/CVE-2011-1490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00033.html" source="SUSE-SU"/>
    <description>
    A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1490/">CVE-2011-1490</cve>
	<bugzilla href="https://bugzilla.suse.com/681568">SUSE bug 681568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1493" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1493" ref_url="https://www.suse.com/security/cve/CVE-2011-1493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
    <description>
    Array index error in the rose_parse_national function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by composing FAC_NATIONAL_DIGIS data that specifies a large number of digipeaters, and then sending this data to a ROSE socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-01-01"/>
	<updated date="2022-01-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1493/">CVE-2011-1493</cve>
	<bugzilla href="https://bugzilla.suse.com/681175">SUSE bug 681175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00030.html" source="SUSE-SU"/>
    <description>
    The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<bugzilla href="https://bugzilla.suse.com/682554">SUSE bug 682554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141605" comment="libpython2_7-1_0-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141606" comment="libpython2_7-1_0-32bit-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141607" comment="python-base-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141608" comment="python-devel-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141609" comment="python-xml-2.7.7-2.36 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1526" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526" source="SUSE CVE"/>
		<reference ref_id="TID7008962" ref_url="https://www.suse.com/support/kb/doc/?id=7008962" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html" source="SUSE-SU"/>
    <description>
    ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<bugzilla href="https://bugzilla.suse.com/698471">SUSE bug 698471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527" source="SUSE CVE"/>
    <description>
    The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527</cve>
	<bugzilla href="https://bugzilla.suse.com/719393">SUSE bug 719393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743742">SUSE bug 743742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html" source="SUSE-SU"/>
    <description>
    The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.  NOTE: the Berkeley DB vector is covered by CVE-2011-4151.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528</cve>
	<bugzilla href="https://bugzilla.suse.com/719393">SUSE bug 719393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743742">SUSE bug 743742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html" source="SUSE-SU"/>
    <description>
    The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529</cve>
	<bugzilla href="https://bugzilla.suse.com/719393">SUSE bug 719393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743742">SUSE bug 743742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530" source="SUSE CVE"/>
    <description>
    The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530</cve>
	<bugzilla href="https://bugzilla.suse.com/730393">SUSE bug 730393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:042" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00003.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/687113">SUSE bug 687113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692784">SUSE bug 692784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1581" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1581" ref_url="https://www.suse.com/security/cve/CVE-2011-1581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
    <description>
    The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1581/">CVE-2011-1581</cve>
	<bugzilla href="https://bugzilla.suse.com/687116">SUSE bug 687116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1585" ref_url="https://www.suse.com/security/cve/CVE-2011-1585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00003.html" source="SUSE-SU"/>
    <description>
    The cifs_find_smb_ses function in fs/cifs/connect.c in the Linux kernel before 2.6.36 does not properly determine the associations between users and sessions, which allows local users to bypass CIFS share authentication by leveraging a mount of a share by a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1585/">CVE-2011-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/687812">SUSE bug 687812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1591" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1592" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1709" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00000.html" source="SUSE-SU"/>
    <description>
    GNOME Display Manager (gdm) before 2.32.2, when glib 2.28 is used, enables execution of a web browser with the uid of the gdm account, which allows local users to gain privileges via vectors involving the x-scheme-handler/http MIME type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709</cve>
	<bugzilla href="https://bugzilla.suse.com/694858">SUSE bug 694858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140601" comment="gdm-3.10.0.1-52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140602" comment="gdm-lang-3.10.0.1-52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140603" comment="gdmflexiserver-3.10.0.1-52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140604" comment="libgdm1-3.10.0.1-52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140605" comment="typelib-1_0-Gdm-1_0-3.10.0.1-52.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141362" comment="gdm-3.10.0.1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141363" comment="gdm-branding-upstream-3.10.0.1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141364" comment="gdm-lang-3.10.0.1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141365" comment="gdmflexiserver-3.10.0.1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141366" comment="libgdm1-3.10.0.1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141367" comment="typelib-1_0-Gdm-1_0-3.10.0.1-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141862" comment="gdm-3.10.0.1-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141863" comment="gdm-branding-upstream-3.10.0.1-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141864" comment="gdm-lang-3.10.0.1-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141865" comment="gdmflexiserver-3.10.0.1-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141866" comment="libgdm1-3.10.0.1-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141867" comment="typelib-1_0-Gdm-1_0-3.10.0.1-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512145" comment="gdm-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512146" comment="gdm-lang-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512147" comment="gdmflexiserver-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512148" comment="libgdm1-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512149" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.6.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1758" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758" source="SUSE CVE"/>
    <description>
    The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<bugzilla href="https://bugzilla.suse.com/691135">SUSE bug 691135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141537" comment="libipa_hbac0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141538" comment="libsss_idmap0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141539" comment="python-sssd-config-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141540" comment="sssd-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141541" comment="sssd-32bit-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141542" comment="sssd-ad-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141543" comment="sssd-ipa-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141544" comment="sssd-krb5-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141545" comment="sssd-krb5-common-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141546" comment="sssd-ldap-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141547" comment="sssd-proxy-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141548" comment="sssd-tools-1.11.5.1-5.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141980" comment="libipa_hbac0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141981" comment="libsss_idmap0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141982" comment="libsss_sudo-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141983" comment="python-sssd-config-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141984" comment="sssd-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141985" comment="sssd-32bit-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141986" comment="sssd-ad-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141987" comment="sssd-ipa-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141988" comment="sssd-krb5-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141989" comment="sssd-krb5-common-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141990" comment="sssd-ldap-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141991" comment="sssd-proxy-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141992" comment="sssd-tools-1.11.5.1-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159140" comment="libipa_hbac0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159141" comment="libsss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159142" comment="libsss_nss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159143" comment="libsss_sudo-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159144" comment="python-sssd-config-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159145" comment="sssd-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159146" comment="sssd-32bit-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159147" comment="sssd-ad-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159148" comment="sssd-ipa-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159149" comment="sssd-krb5-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159150" comment="sssd-krb5-common-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159151" comment="sssd-ldap-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159152" comment="sssd-proxy-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159153" comment="sssd-tools-1.13.4-33.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512322" comment="libipa_hbac0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512323" comment="libsss_certmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512324" comment="libsss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512325" comment="libsss_nss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512326" comment="libsss_simpleifp0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166514" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512327" comment="python-sssd-config-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512328" comment="sssd-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512329" comment="sssd-32bit-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512330" comment="sssd-ad-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512331" comment="sssd-ipa-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512332" comment="sssd-krb5-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512333" comment="sssd-krb5-common-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512334" comment="sssd-ldap-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512335" comment="sssd-proxy-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512336" comment="sssd-tools-1.16.1-2.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1761" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0551-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761</cve>
	<bugzilla href="https://bugzilla.suse.com/691137">SUSE bug 691137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710726">SUSE bug 710726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177725" comment="libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1830" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1830" ref_url="https://www.suse.com/security/cve/CVE-2011-1830" source="SUSE CVE"/>
    <description>
    Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-1830/">CVE-2011-1830</cve>
	<bugzilla href="https://bugzilla.suse.com/1134166">SUSE bug 1134166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338710" comment="ekiga is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1831" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1832" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1221-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1222-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00007.html" source="SUSE-SU"/>
    <description>
    Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1834" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1835" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1836" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1837" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<bugzilla href="https://bugzilla.suse.com/702025">SUSE bug 702025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724906">SUSE bug 724906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1907" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.8.x before 9.8.0-P1, when Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907</cve>
	<bugzilla href="https://bugzilla.suse.com/692210">SUSE bug 692210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0603-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00014.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<bugzilla href="https://bugzilla.suse.com/696585">SUSE bug 696585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698286">SUSE bug 698286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0839-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00035.html" source="SUSE-SU"/>
    <description>
    Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697372">SUSE bug 697372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0694-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00041.html" source="SUSE-SU"/>
    <description>
    gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<bugzilla href="https://bugzilla.suse.com/695627">SUSE bug 695627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140842" comment="libgnomesu-2.0.0-353.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140843" comment="libgnomesu-lang-2.0.0-353.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140844" comment="libgnomesu0-2.0.0-353.6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141524" comment="libgnomesu-1.0.0-352.84 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141525" comment="libgnomesu-lang-1.0.0-352.84 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141526" comment="libgnomesu0-1.0.0-352.84 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1947" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947" source="SUSE CVE"/>
    <description>
    fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<bugzilla href="https://bugzilla.suse.com/697368">SUSE bug 697368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141329" comment="fetchmail-6.3.26-5.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1957" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1958" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1959" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2054" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054" source="SUSE CVE"/>
    <description>
    A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054</cve>
	<bugzilla href="https://bugzilla.suse.com/709167">SUSE bug 709167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140939" comment="libsoup-2_4-1-2.54.1-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140940" comment="libsoup-2_4-1-32bit-2.54.1-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140941" comment="libsoup-lang-2.54.1-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140942" comment="typelib-1_0-Soup-2_4-2.54.1-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141687" comment="libsoup-2_4-1-2.44.2-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141688" comment="libsoup-2_4-1-32bit-2.44.2-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141689" comment="libsoup-lang-2.44.2-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141690" comment="typelib-1_0-Soup-2_4-2.44.2-1.46 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512472" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512473" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512474" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512475" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2107" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2107" ref_url="https://www.suse.com/security/cve/CVE-2011-2107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.22 and earlier on Android, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to a "universal cross-site scripting vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2107/">CVE-2011-2107</cve>
	<bugzilla href="https://bugzilla.suse.com/698261">SUSE bug 698261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698296">SUSE bug 698296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698358">SUSE bug 698358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2110" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2110" ref_url="https://www.suse.com/security/cve/CVE-2011-2110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00004.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in June 2011.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2110/">CVE-2011-2110</cve>
	<bugzilla href="https://bugzilla.suse.com/699942">SUSE bug 699942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2130" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2130" ref_url="https://www.suse.com/security/cve/CVE-2011-2130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2134, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2130/">CVE-2011-2130</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2134" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2134" ref_url="https://www.suse.com/security/cve/CVE-2011-2134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2134/">CVE-2011-2134</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2135" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2135" ref_url="https://www.suse.com/security/cve/CVE-2011-2135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2140, CVE-2011-2417, and CVE-2011-2425.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2135/">CVE-2011-2135</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2136" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2136" ref_url="https://www.suse.com/security/cve/CVE-2011-2136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2138 and CVE-2011-2416.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2136/">CVE-2011-2136</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2137" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2137" ref_url="https://www.suse.com/security/cve/CVE-2011-2137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2414, and CVE-2011-2415.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2137/">CVE-2011-2137</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2138" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2138" ref_url="https://www.suse.com/security/cve/CVE-2011-2138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2416.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2138/">CVE-2011-2138</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2139" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2139" ref_url="https://www.suse.com/security/cve/CVE-2011-2139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2139/">CVE-2011-2139</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2140" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2140" ref_url="https://www.suse.com/security/cve/CVE-2011-2140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2140/">CVE-2011-2140</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2174" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2175" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2178" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2178" ref_url="https://www.suse.com/security/cve/CVE-2011-2178" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0643-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00030.html" source="SUSE-SU"/>
    <description>
    The virSecurityManagerGetPrivateData function in security/security_manager.c in libvirt 0.8.8 through 0.9.1 uses the wrong argument for a sizeof call, which causes incorrect processing of "security manager private data" that "reopens disk probing" and might allow guest OS users to read arbitrary files on the host OS.  NOTE: this vulnerability exists because of a CVE-2010-2238 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2178/">CVE-2011-2178</cve>
	<bugzilla href="https://bugzilla.suse.com/697904">SUSE bug 697904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in tftp-hpa before 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the utimeout option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<bugzilla href="https://bugzilla.suse.com/699714">SUSE bug 699714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141141" comment="tftp-5.2-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141816" comment="tftp-5.2-8.84 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512624" comment="tftp-5.2-11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<bugzilla href="https://bugzilla.suse.com/699709">SUSE bug 699709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2366" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Gecko before 5.0, as used in Firefox before 5.0 and Thunderbird before 5.0, does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2367" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict read operations, which allows remote attackers to obtain sensitive information from GPU memory associated with an arbitrary process, or cause a denial of service (application crash), via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2368" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict write operations, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 4.0.1 allows remote attackers to inject arbitrary web script or HTML via an SVG element containing an HTML-encoded entity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2370" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 5.0 does not properly enforce the whitelist for the xpinstall functionality, which allows remote attackers to trigger an installation dialog for a (1) add-on or (2) theme via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2371" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2372" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2373" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2374" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2375" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375" source="SUSE CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2377" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2414" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2414" ref_url="https://www.suse.com/security/cve/CVE-2011-2414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2415.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2414/">CVE-2011-2414</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2415" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2415" ref_url="https://www.suse.com/security/cve/CVE-2011-2415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2415/">CVE-2011-2415</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2416" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2416" ref_url="https://www.suse.com/security/cve/CVE-2011-2416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2138.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2416/">CVE-2011-2416</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2417" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2417" ref_url="https://www.suse.com/security/cve/CVE-2011-2417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2425.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2417/">CVE-2011-2417</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2425" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2425" ref_url="https://www.suse.com/security/cve/CVE-2011-2425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2417.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2425/">CVE-2011-2425</cve>
	<bugzilla href="https://bugzilla.suse.com/711427">SUSE bug 711427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2445" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2445" ref_url="https://www.suse.com/security/cve/CVE-2011-2445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2445/">CVE-2011-2445</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2450" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2450" ref_url="https://www.suse.com/security/cve/CVE-2011-2450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2450/">CVE-2011-2450</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2451" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2451" ref_url="https://www.suse.com/security/cve/CVE-2011-2451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2451/">CVE-2011-2451</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2452" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2452" ref_url="https://www.suse.com/security/cve/CVE-2011-2452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2452/">CVE-2011-2452</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2453" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2453" ref_url="https://www.suse.com/security/cve/CVE-2011-2453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2454, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2453/">CVE-2011-2453</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2454" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2454" ref_url="https://www.suse.com/security/cve/CVE-2011-2454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2454/">CVE-2011-2454</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2455" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2455" ref_url="https://www.suse.com/security/cve/CVE-2011-2455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2459, and CVE-2011-2460.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2455/">CVE-2011-2455</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2456" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2456" ref_url="https://www.suse.com/security/cve/CVE-2011-2456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2456/">CVE-2011-2456</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2457" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2457" ref_url="https://www.suse.com/security/cve/CVE-2011-2457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2457/">CVE-2011-2457</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2458" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2458" ref_url="https://www.suse.com/security/cve/CVE-2011-2458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, when Internet Explorer is used, allows remote attackers to bypass the cross-domain policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2458/">CVE-2011-2458</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2459" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2459" ref_url="https://www.suse.com/security/cve/CVE-2011-2459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, and CVE-2011-2460.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2459/">CVE-2011-2459</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2460" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2460" ref_url="https://www.suse.com/security/cve/CVE-2011-2460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1240-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, and CVE-2011-2459.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2460/">CVE-2011-2460</cve>
	<bugzilla href="https://bugzilla.suse.com/729797">SUSE bug 729797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:029" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00006.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<bugzilla href="https://bugzilla.suse.com/703907">SUSE bug 703907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:035" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0921-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0972-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1137-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1670-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1676-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00028.html" source="SUSE-SU"/>
    <description>
    crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<bugzilla href="https://bugzilla.suse.com/700876">SUSE bug 700876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701491">SUSE bug 701491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713727">SUSE bug 713727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141138" comment="sysvinit-tools-2.88+-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141176" comment="yast2-core-3.1.23-6.38 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141813" comment="sysvinit-tools-2.88+-94.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141840" comment="yast2-core-3.1.11-1.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141813" comment="sysvinit-tools-2.88+-94.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142072" comment="yast2-core-3.1.18-1.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159312" comment="sysvinit-tools-2.88+-99.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159326" comment="yast2-core-3.2.2-1.29 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159312" comment="sysvinit-tools-2.88+-99.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512638" comment="yast2-core-3.3.1-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000174.html" source="SUSE-SU"/>
    <description>
    The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141352" comment="gdk-pixbuf-lang-2.30.6-1.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141353" comment="gdk-pixbuf-query-loaders-2.30.6-1.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141354" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-1.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141355" comment="libgdk_pixbuf-2_0-0-2.30.6-1.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141356" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-1.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141357" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-1.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158993" comment="gdk-pixbuf-lang-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158994" comment="gdk-pixbuf-query-loaders-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158995" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158996" comment="libgdk_pixbuf-2_0-0-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158997" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158998" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2501" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<bugzilla href="https://bugzilla.suse.com/702578">SUSE bug 702578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00019.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<bugzilla href="https://bugzilla.suse.com/703084">SUSE bug 703084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2513" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2513" ref_url="https://www.suse.com/security/cve/CVE-2011-2513" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0829-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00032.html" source="SUSE-SU"/>
    <description>
    The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to obtain the username and full path of the home and cache directories by accessing properties of the ClassLoader.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2513/">CVE-2011-2513</cve>
	<bugzilla href="https://bugzilla.suse.com/704309">SUSE bug 704309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2514" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2514" ref_url="https://www.suse.com/security/cve/CVE-2011-2514" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0829-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00032.html" source="SUSE-SU"/>
    <description>
    The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to trick victims into granting access to local files by modifying the content of the Java Web Start Security Warning dialog box to represent a different filename than the file for which access will be granted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2514/">CVE-2011-2514</cve>
	<bugzilla href="https://bugzilla.suse.com/704309">SUSE bug 704309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0998-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<bugzilla href="https://bugzilla.suse.com/705241">SUSE bug 705241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00022.html" source="SUSE-SU"/>
    <description>
    The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<bugzilla href="https://bugzilla.suse.com/706728">SUSE bug 706728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2690" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<bugzilla href="https://bugzilla.suse.com/706387">SUSE bug 706387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706388">SUSE bug 706388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2691" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<bugzilla href="https://bugzilla.suse.com/706388">SUSE bug 706388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2692" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<bugzilla href="https://bugzilla.suse.com/706389">SUSE bug 706389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0998-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<bugzilla href="https://bugzilla.suse.com/705681">SUSE bug 705681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105600" comment="libsndfile1-1.0.25-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105601" comment="libsndfile1-32bit-1.0.25-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141680" comment="libsndfile1-1.0.25-18.75 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141681" comment="libsndfile1-32bit-1.0.25-18.75 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0892-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00017.html" source="SUSE-SU"/>
    <description>
    foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<bugzilla href="https://bugzilla.suse.com/706728">SUSE bug 706728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2707" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2707" ref_url="https://www.suse.com/security/cve/CVE-2011-2707" source="SUSE CVE"/>
    <description>
    The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2707/">CVE-2011-2707</cve>
	<bugzilla href="https://bugzilla.suse.com/707337">SUSE bug 707337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2709" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709" source="SUSE CVE"/>
    <description>
    libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709</cve>
	<bugzilla href="https://bugzilla.suse.com/694598">SUSE bug 694598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0940-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00033.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/708263">SUSE bug 708263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141235" comment="clamav-0.98.4-1.46 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722" source="SUSE CVE"/>
    <description>
    The send_data_to_stdout function in prnt/hpijs/hpcupsfax.cpp in HP Linux Imaging and Printing (HPLIP) 3.x before 3.11.10 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hpcupsfax.out temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713717">SUSE bug 713717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2724" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2724" ref_url="https://www.suse.com/security/cve/CVE-2011-2724" source="SUSE CVE"/>
    <description>
    The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2724/">CVE-2011-2724</cve>
	<bugzilla href="https://bugzilla.suse.com/1160791">SUSE bug 1160791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709819">SUSE bug 709819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html" source="SUSE-SU"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<bugzilla href="https://bugzilla.suse.com/712653">SUSE bug 712653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html" source="SUSE-SU"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<bugzilla href="https://bugzilla.suse.com/712653">SUSE bug 712653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1035-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00004.html" source="SUSE-SU"/>
    <description>
    The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<bugzilla href="https://bugzilla.suse.com/709851">SUSE bug 709851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711487">SUSE bug 711487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108654" comment="libXfont1-1.4.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141437" comment="libXfont1-1.4.7-2.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1152-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671735">SUSE bug 671735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711491">SUSE bug 711491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2985" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2986" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products, when the Direct2D (aka D2D) API is used on Windows, allows remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2988" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2989" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement WebGL, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2990" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The implementation of Content Security Policy (CSP) violation reports in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not remove proxy-authorization credentials from the listed request headers, which allows attackers to obtain sensitive information by reading a report, related to incorrect host resolution that occurs with certain redirects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2991" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement JavaScript, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2992" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Ogg reader in the browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2993" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2995" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00030.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2996" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2997" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3000" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3001" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3002" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
    <description>
    Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3003" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3004" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
    <description>
    The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3005" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<bugzilla href="https://bugzilla.suse.com/747311">SUSE bug 747311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747327">SUSE bug 747327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747328">SUSE bug 747328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3045" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0432-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0466-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<bugzilla href="https://bugzilla.suse.com/752008">SUSE bug 752008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754456">SUSE bug 754456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00031.html" source="SUSE-SU"/>
    <description>
    The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<bugzilla href="https://bugzilla.suse.com/754745">SUSE bug 754745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<bugzilla href="https://bugzilla.suse.com/754458">SUSE bug 754458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3101" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0656-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors.  NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<bugzilla href="https://bugzilla.suse.com/762481">SUSE bug 762481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00003.html" source="SUSE-SU"/>
    <description>
    librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<bugzilla href="https://bugzilla.suse.com/714980">SUSE bug 714980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140597" comment="gdk-pixbuf-loader-rsvg-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140598" comment="librsvg-2-2-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140599" comment="librsvg-2-2-32bit-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140600" comment="rsvg-view-2.40.15-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141358" comment="gdk-pixbuf-loader-rsvg-2.40.2-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141359" comment="librsvg-2-2-2.40.2-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141360" comment="librsvg-2-2-32bit-2.40.2-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141361" comment="rsvg-view-2.40.2-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009175785" comment="gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175787" comment="librsvg-2-2-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175788" comment="librsvg-2-2-32bit-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175789" comment="rsvg-view-2.40.20-5.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1218-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<bugzilla href="https://bugzilla.suse.com/724480">SUSE bug 724480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141764" comment="pam-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141765" comment="pam-32bit-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141766" comment="pam-doc-1.1.8-11.57 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512585" comment="pam-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512586" comment="pam-32bit-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512587" comment="pam-doc-1.1.8-24.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1218-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00005.html" source="SUSE-SU"/>
    <description>
    The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<bugzilla href="https://bugzilla.suse.com/724480">SUSE bug 724480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141764" comment="pam-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141765" comment="pam-32bit-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141766" comment="pam-doc-1.1.8-11.57 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512585" comment="pam-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512586" comment="pam-32bit-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512587" comment="pam-doc-1.1.8-24.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3172" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004204.html" source="SUSE-SU"/>
    <description>
    A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<bugzilla href="https://bugzilla.suse.com/1149683">SUSE bug 1149683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141767" comment="pam-modules-12.1-23.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177" source="SUSE CVE"/>
    <description>
    The YaST2 network created files with world readable permissions which could have allowed local users to read sensitive material out of network configuration files, like passwords for wireless networks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<bugzilla href="https://bugzilla.suse.com/713661">SUSE bug 713661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141175" comment="yast2-3.1.206-37.1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141176" comment="yast2-core-3.1.23-6.38 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141839" comment="yast2-3.1.108-1.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141840" comment="yast2-core-3.1.11-1.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142071" comment="yast2-3.1.155-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142072" comment="yast2-core-3.1.18-1.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159325" comment="yast2-3.2.36-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159326" comment="yast2-core-3.2.2-1.29 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512637" comment="yast2-3.2.48-3.29.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512638" comment="yast2-core-3.3.1-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3193" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<bugzilla href="https://bugzilla.suse.com/714984">SUSE bug 714984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00013.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<bugzilla href="https://bugzilla.suse.com/714658">SUSE bug 714658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141802" comment="rsyslog-8.4.0-2.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142058" comment="rsyslog-8.4.0-8.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159295" comment="rsyslog-8.24.0-1.20 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512617" comment="rsyslog-8.24.0-3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3207" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1144-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00018.html" source="SUSE-SU"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<bugzilla href="https://bugzilla.suse.com/716143">SUSE bug 716143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1144-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00018.html" source="SUSE-SU"/>
    <description>
    The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<bugzilla href="https://bugzilla.suse.com/716144">SUSE bug 716144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3232" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<bugzilla href="https://bugzilla.suse.com/728044">SUSE bug 728044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730124">SUSE bug 730124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748083">SUSE bug 748083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3266" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00022.html" source="SUSE-SU"/>
    <description>
    The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3328" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328" source="SUSE CVE"/>
    <description>
    The png_handle_cHRM function in pngrutil.c in libpng 1.5.4, when color-correction support is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a malformed PNG image containing a cHRM chunk associated with a certain zero value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<bugzilla href="https://bugzilla.suse.com/720017">SUSE bug 720017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3377" ref_url="https://www.suse.com/security/cve/CVE-2011-3377" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0371-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00028.html" source="SUSE-SU"/>
    <description>
    The web browser plug-in in IcedTea-Web 1.0.x before 1.0.6 and 1.1.x before 1.1.4 allows remote attackers to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same second-level domain, but a different sub-domain than the targeted domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3377/">CVE-2011-3377</cve>
	<bugzilla href="https://bugzilla.suse.com/729870">SUSE bug 729870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0114-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0122-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7001524" ref_url="https://www.suse.com/support/kb/doc/?id=7001524" source="SUSE-SU"/>
		<reference ref_id="TID7009901" ref_url="https://www.suse.com/support/kb/doc/?id=7009901" source="SUSE-SU"/>
		<reference ref_id="TID7015841" ref_url="https://www.suse.com/support/kb/doc/?id=7015841" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022397" ref_url="https://www.suse.com/support/kb/doc/?id=7022397" source="SUSE-SU"/>
		<reference ref_id="TID7022454" ref_url="https://www.suse.com/support/kb/doc/?id=7022454" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0063-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<bugzilla href="https://bugzilla.suse.com/716002">SUSE bug 716002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719047">SUSE bug 719047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725167">SUSE bug 725167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726096">SUSE bug 726096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739248">SUSE bug 739248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739256">SUSE bug 739256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742306">SUSE bug 742306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759666">SUSE bug 759666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763598">SUSE bug 763598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141329" comment="fetchmail-6.3.26-5.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141329" comment="fetchmail-6.3.26-5.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141605" comment="libpython2_7-1_0-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141606" comment="libpython2_7-1_0-32bit-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141607" comment="python-base-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141608" comment="python-devel-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141609" comment="python-xml-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" source="SUSE-SU"/>
    <description>
    FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<bugzilla href="https://bugzilla.suse.com/730124">SUSE bug 730124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748083">SUSE bug 748083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3464" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3464" ref_url="https://www.suse.com/security/cve/CVE-2011-3464" source="SUSE CVE"/>
    <description>
    Off-by-one error in the png_formatted_warning function in pngerror.c in libpng 1.5.4 through 1.5.7 might allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unspecified vectors, which trigger a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3464/">CVE-2011-3464</cve>
	<bugzilla href="https://bugzilla.suse.com/745029">SUSE bug 745029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3483" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3563" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1323-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00041.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Virtual Desktop Infrastructure (VDI) component in Oracle Virtualization 3.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Session.  NOTE: this CVE identifier was accidentally used for a Concurrency issue in Java Runtime Environment, but that issue has been reassigned to CVE-2012-0507.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/742115">SUSE bug 742115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3594" ref_url="https://www.suse.com/security/cve/CVE-2011-3594" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-12/msg00001.html" source="SUSE-SU"/>
    <description>
    The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3594/">CVE-2011-3594</cve>
	<bugzilla href="https://bugzilla.suse.com/722199">SUSE bug 722199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736161">SUSE bug 736161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name.  NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<bugzilla href="https://bugzilla.suse.com/721968">SUSE bug 721968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00030.html" source="SUSE-SU"/>
    <description>
    The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<bugzilla href="https://bugzilla.suse.com/724856">SUSE bug 724856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809945">SUSE bug 809945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141235" comment="clamav-0.98.4-1.46 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3630" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3631" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3632" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3635" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3635" ref_url="https://www.suse.com/security/cve/CVE-2011-3635" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1257-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00021.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the theme_adium_append_message function in empathy-theme-adium.c in the Adium theme in libempathy-gtk in Empathy 3.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted alias (aka nickname).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3635/">CVE-2011-3635</cve>
	<bugzilla href="https://bugzilla.suse.com/727003">SUSE bug 727003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141316" comment="empathy-3.10.3-1.131 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141317" comment="empathy-lang-3.10.3-1.131 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141318" comment="telepathy-mission-control-plugin-goa-3.10.3-1.131 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142089" comment="empathy-3.12.12-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142090" comment="empathy-lang-3.12.12-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142091" comment="telepathy-mission-control-plugin-goa-3.12.12-5.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159630" comment="empathy-3.12.12-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159631" comment="empathy-lang-3.12.12-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159632" comment="telepathy-mission-control-plugin-goa-3.12.12-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512118" comment="empathy-3.12.13-8.3.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512119" comment="empathy-lang-3.12.13-8.3.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512120" comment="telepathy-mission-control-plugin-goa-3.12.13-8.3.28 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1241-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0063-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00021.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory.  NOTE: the vendor's response was "Strange behavior, but we're not treating this as a security bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/726096">SUSE bug 726096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3648" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3650" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3651" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3652" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3654" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly handle links from SVG mpath elements to non-SVG elements, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3655" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3660" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3661" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3663" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3848" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1190-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<bugzilla href="https://bugzilla.suse.com/721139">SUSE bug 721139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726372">SUSE bug 726372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3872" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<bugzilla href="https://bugzilla.suse.com/726372">SUSE bug 726372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3922" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00021.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<bugzilla href="https://bugzilla.suse.com/739904">SUSE bug 739904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740493">SUSE bug 740493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742821">SUSE bug 742821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<bugzilla href="https://bugzilla.suse.com/729486">SUSE bug 729486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4182" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0242-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00035.html" source="SUSE-SU"/>
    <description>
    Missing escaping of ESSID values in sysconfig of SUSE Linux Enterprise allows attackers controlling an access point to cause execute arbitrary code. Affected releases are sysconfig prior to 0.83.7-2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<bugzilla href="https://bugzilla.suse.com/735394">SUSE bug 735394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141132" comment="sysconfig-0.84.0-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141133" comment="sysconfig-netconfig-0.84.0-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141811" comment="sysconfig-0.83.7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141812" comment="sysconfig-netconfig-0.83.7-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142060" comment="sysconfig-0.83.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142061" comment="sysconfig-netconfig-0.83.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1270-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1270-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00029.html" source="SUSE-SU"/>
    <description>
    query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<bugzilla href="https://bugzilla.suse.com/730995">SUSE bug 730995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738156">SUSE bug 738156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4324" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4324" ref_url="https://www.suse.com/security/cve/CVE-2011-4324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4324/">CVE-2011-4324</cve>
	<bugzilla href="https://bugzilla.suse.com/732613">SUSE bug 732613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4349" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349" source="SUSE CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in (1) cd-mapping-db.c and (2) cd-device-db.c in colord before 0.1.15 allow local users to execute arbitrary SQL commands via vectors related to color devices and (a) device id, (b) property, or (c) profile id.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<bugzilla href="https://bugzilla.suse.com/698250">SUSE bug 698250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732996">SUSE bug 732996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141236" comment="colord-1.1.7-2.42 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141237" comment="colord-gtk-lang-0.1.25-3.113 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141238" comment="colord-lang-1.1.7-2.42 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141239" comment="libcolord-gtk1-0.1.25-3.113 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141240" comment="libcolord2-1.1.7-2.42 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141241" comment="libcolord2-32bit-1.1.7-2.42 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141242" comment="libcolorhug2-1.1.7-2.42 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141852" comment="colord-1.1.7-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141237" comment="colord-gtk-lang-0.1.25-3.113 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141853" comment="colord-lang-1.1.7-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141239" comment="libcolord-gtk1-0.1.25-3.113 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141854" comment="libcolord2-1.1.7-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141855" comment="libcolord2-32bit-1.1.7-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141856" comment="libcolorhug2-1.1.7-5.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142079" comment="colord-1.3.3-10.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140490" comment="colord-gtk-lang-0.1.26-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142080" comment="colord-lang-1.3.3-10.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140491" comment="libcolord-gtk1-0.1.26-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140492" comment="libcolord2-1.3.3-10.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140493" comment="libcolord2-32bit-1.3.3-10.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140494" comment="libcolorhug2-1.3.3-10.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159627" comment="colord-1.3.3-12.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140490" comment="colord-gtk-lang-0.1.26-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159628" comment="colord-lang-1.3.3-12.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140491" comment="libcolord-gtk1-0.1.26-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158945" comment="libcolord2-1.3.3-12.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158946" comment="libcolord2-32bit-1.3.3-12.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158947" comment="libcolorhug2-1.3.3-12.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4354" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00011.html" source="SUSE-SU"/>
    <description>
    crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<bugzilla href="https://bugzilla.suse.com/733252">SUSE bug 733252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808942">SUSE bug 808942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4405" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1331-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1331-2" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00028.html" source="SUSE-SU"/>
    <description>
    The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<bugzilla href="https://bugzilla.suse.com/733542">SUSE bug 733542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735322">SUSE bug 735322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141076" comment="python-cupshelpers-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141077" comment="system-config-printer-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141078" comment="system-config-printer-common-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141079" comment="system-config-printer-common-lang-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141080" comment="system-config-printer-dbus-service-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141081" comment="udev-configure-printer-1.5.7-7.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141781" comment="python-cupshelpers-1.4.5-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141782" comment="system-config-printer-1.4.5-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141783" comment="system-config-printer-common-1.4.5-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141784" comment="system-config-printer-common-lang-1.4.5-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141785" comment="system-config-printer-dbus-service-1.4.5-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141786" comment="udev-configure-printer-1.4.5-1.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1317-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-16"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516</cve>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725758">SUSE bug 725758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1317-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517</cve>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725758">SUSE bug 725758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-12/msg00006.html" source="SUSE-SU"/>
    <description>
    dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/735610">SUSE bug 735610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741239">SUSE bug 741239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021400" ref_url="https://www.suse.com/support/kb/doc/?id=7021400" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021736" ref_url="https://www.suse.com/support/kb/doc/?id=7021736" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021991" ref_url="https://www.suse.com/support/kb/doc/?id=7021991" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4600" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600" source="SUSE CVE"/>
    <description>
    The networkReloadIptablesRules function in network/bridge_driver.c in libvirt before 0.9.9 does not properly handle firewall rules on bridge networks when libvirtd is restarted, which might allow remote attackers to bypass intended access restrictions via a (1) DNS or (2) DHCP query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<bugzilla href="https://bugzilla.suse.com/736082">SUSE bug 736082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4604" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604</cve>
	<bugzilla href="https://bugzilla.suse.com/736149">SUSE bug 736149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799454">SUSE bug 799454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4815" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<bugzilla href="https://bugzilla.suse.com/739122">SUSE bug 739122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<bugzilla href="https://bugzilla.suse.com/738632">SUSE bug 738632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868" source="SUSE CVE"/>
    <description>
    The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<bugzilla href="https://bugzilla.suse.com/741239">SUSE bug 741239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<bugzilla href="https://bugzilla.suse.com/754447">SUSE bug 754447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141605" comment="libpython2_7-1_0-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141606" comment="libpython2_7-1_0-32bit-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141607" comment="python-base-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141608" comment="python-devel-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141609" comment="python-xml-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-5035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757762">SUSE bug 757762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-5095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5095" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000183.html" source="SUSE-SU"/>
    <description>
    The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<bugzilla href="https://bugzilla.suse.com/768097">SUSE bug 768097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773908">SUSE bug 773908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-5327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5327" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-5327" ref_url="https://www.suse.com/security/cve/CVE-2011-5327" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5327/">CVE-2011-5327</cve>
	<bugzilla href="https://bugzilla.suse.com/1143175">SUSE bug 1143175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0027" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0267-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00055.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<bugzilla href="https://bugzilla.suse.com/740165">SUSE bug 740165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747331">SUSE bug 747331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0035" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035" source="SUSE CVE"/>
    <description>
    Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<bugzilla href="https://bugzilla.suse.com/740447">SUSE bug 740447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141312" comment="emacs-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141313" comment="emacs-info-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141314" comment="emacs-x11-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141315" comment="etags-24.3-14.44 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158975" comment="emacs-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158977" comment="emacs-info-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158979" comment="emacs-x11-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158980" comment="etags-24.3-19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009164489" comment="emacs-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164490" comment="emacs-info-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164491" comment="emacs-x11-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164492" comment="etags-24.3-25.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0037" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0428-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0433-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00052.html" source="SUSE-SU"/>
    <description>
    Redland Raptor (aka libraptor) before 2.0.7, as used by OpenOffice 3.3 and 3.4 Beta, LibreOffice before 3.4.6 and 3.5.x before 3.5.1, and other products, allows user-assisted remote attackers to read arbitrary files via a crafted XML external entity (XXE) declaration and reference in an RDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<bugzilla href="https://bugzilla.suse.com/37195">SUSE bug 37195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734781">SUSE bug 734781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740453">SUSE bug 740453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745298">SUSE bug 745298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141628" comment="raptor-2.0.10-3.67 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0266-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742821">SUSE bug 742821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0056" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/&lt;pid&gt;/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<bugzilla href="https://bugzilla.suse.com/1171985">SUSE bug 1171985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742028">SUSE bug 742028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742279">SUSE bug 742279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0886-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application.  NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764077">SUSE bug 764077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0692-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<bugzilla href="https://bugzilla.suse.com/746880">SUSE bug 746880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141196" comment="ImageMagick-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141197" comment="libMagick++-6_Q16-3-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141198" comment="libMagickCore-6_Q16-1-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141199" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141200" comment="libMagickWand-6_Q16-1-6.8.8.1-5.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0248" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0692-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<bugzilla href="https://bugzilla.suse.com/746880">SUSE bug 746880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141196" comment="ImageMagick-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141197" comment="libMagick++-6_Q16-3-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141198" comment="libMagickCore-6_Q16-1-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141199" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141200" comment="libMagickWand-6_Q16-1-6.8.8.1-5.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00010.html" source="SUSE-SU"/>
    <description>
    The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<bugzilla href="https://bugzilla.suse.com/739898">SUSE bug 739898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0443" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747912">SUSE bug 747912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0445" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to bypass the HTML5 frame-navigation policy and replace arbitrary sub-frames by creating a form submission target with a sub-frame's name attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0446" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to inject arbitrary web script or HTML via a (1) web page or (2) Firefox extension, related to improper enforcement of XPConnect security restrictions for frame scripts that call untrusted objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0447" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize data for image/vnd.microsoft.icon images, which allows remote attackers to obtain potentially sensitive information by reading a PNG image that was created through conversion from an ICO image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed XSLT stylesheet that is embedded in a document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0451" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0452" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<bugzilla href="https://bugzilla.suse.com/746616">SUSE bug 746616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746663">SUSE bug 746663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0455" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0456" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0457" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict write access to the window.fullScreen object, which allows remote attackers to spoof the user interface via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0462" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0463" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsWindow implementation in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 does not check the validity of an instance after event dispatching, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, as demonstrated by Mobile Firefox on Android.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0464" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (assertion failure and memory corruption) or possibly execute arbitrary code via vectors related to jsval.h and the js::array_shift function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::indexedDB::IDBKeyRange::cycleCollection::Trace function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to execute arbitrary code via vectors related to crafted IndexedDB data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via a multibyte character set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The WebGLBuffer::FindMaxUshortElement function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 calls the FindMaxElementInSubArray function with incorrect template arguments, which allows remote attackers to obtain sensitive information from video memory via a crafted WebGL.drawElements call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the docshell implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via vectors related to short-circuited page loads, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to spoof the address bar via an https URL for invalid (1) RSS or (2) Atom XML content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0497" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0501" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0502" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0503" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0506" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and "a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited." NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "toolkit internals references."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0751" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0751" ref_url="https://www.suse.com/security/cve/CVE-2012-0751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html" source="SUSE-SU"/>
    <description>
    The ActiveX control in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0751/">CVE-2012-0751</cve>
	<bugzilla href="https://bugzilla.suse.com/747297">SUSE bug 747297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747307">SUSE bug 747307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0752" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0752" ref_url="https://www.suse.com/security/cve/CVE-2012-0752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0752/">CVE-2012-0752</cve>
	<bugzilla href="https://bugzilla.suse.com/747297">SUSE bug 747297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747307">SUSE bug 747307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0753" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0753" ref_url="https://www.suse.com/security/cve/CVE-2012-0753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted MP4 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0753/">CVE-2012-0753</cve>
	<bugzilla href="https://bugzilla.suse.com/747297">SUSE bug 747297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747307">SUSE bug 747307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0754" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0754" ref_url="https://www.suse.com/security/cve/CVE-2012-0754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0754/">CVE-2012-0754</cve>
	<bugzilla href="https://bugzilla.suse.com/747297">SUSE bug 747297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747307">SUSE bug 747307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0755" ref_url="https://www.suse.com/security/cve/CVE-2012-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2012-0756.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0755/">CVE-2012-0755</cve>
	<bugzilla href="https://bugzilla.suse.com/747297">SUSE bug 747297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747307">SUSE bug 747307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0756" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0756" ref_url="https://www.suse.com/security/cve/CVE-2012-0756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2012-0755.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0756/">CVE-2012-0756</cve>
	<bugzilla href="https://bugzilla.suse.com/747297">SUSE bug 747297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747307">SUSE bug 747307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0759" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0767" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0767" ref_url="https://www.suse.com/security/cve/CVE-2012-0767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)," as exploited in the wild in February 2012.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0767/">CVE-2012-0767</cve>
	<bugzilla href="https://bugzilla.suse.com/747297">SUSE bug 747297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747309">SUSE bug 747309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0768" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0768" ref_url="https://www.suse.com/security/cve/CVE-2012-0768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0332-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00014.html" source="SUSE-SU"/>
    <description>
    The Matrix3D component in Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0768/">CVE-2012-0768</cve>
	<bugzilla href="https://bugzilla.suse.com/750614">SUSE bug 750614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0769" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0769" ref_url="https://www.suse.com/security/cve/CVE-2012-0769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0332-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0769/">CVE-2012-0769</cve>
	<bugzilla href="https://bugzilla.suse.com/750614">SUSE bug 750614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0773" ref_url="https://www.suse.com/security/cve/CVE-2012-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The NetStream class in Adobe Flash Player before 10.3.183.18 and 11.x before 11.2.202.228 on Windows, Mac OS X, and Linux; Flash Player before 10.3.183.18 and 11.x before 11.2.202.223 on Solaris; Flash Player before 11.1.111.8 on Android 2.x and 3.x; and AIR before 3.2.0.2070 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0773/">CVE-2012-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/754688">SUSE bug 754688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754689">SUSE bug 754689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0779" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0779" ref_url="https://www.suse.com/security/cve/CVE-2012-0779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0592-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00005.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.19 and 11.x before 11.2.202.235 on Windows, Mac OS X, and Linux; before 11.1.111.9 on Android 2.x and 3.x; and before 11.1.115.8 on Android 4.x allows remote attackers to execute arbitrary code via a crafted file, related to an "object confusion vulnerability," as exploited in the wild in May 2012.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0779/">CVE-2012-0779</cve>
	<bugzilla href="https://bugzilla.suse.com/760777">SUSE bug 760777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000961.html" source="SUSE-SU"/>
    <description>
    The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111372" comment="libaugeas0-1.2.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141442" comment="libaugeas0-1.2.0-1.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140461" comment="augeas-1.2.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140462" comment="augeas-lenses-1.2.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140463" comment="libaugeas0-1.2.0-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158941" comment="augeas-1.2.0-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158942" comment="augeas-lenses-1.2.0-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158943" comment="libaugeas0-1.2.0-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172798" comment="augeas-1.2.0-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172799" comment="augeas-lenses-1.2.0-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172800" comment="libaugeas0-1.2.0-17.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<bugzilla href="https://bugzilla.suse.com/744059">SUSE bug 744059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140516" comment="cvs-1.12.12-181.63 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009163575" comment="cvs-1.12.12-182.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
    <description>
    Memory leak in smbd in Samba 3.6.x before 3.6.3 allows remote attackers to cause a denial of service (memory and CPU consumption) by making many connection requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<bugzilla href="https://bugzilla.suse.com/743986">SUSE bug 743986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<bugzilla href="https://bugzilla.suse.com/747125">SUSE bug 747125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141605" comment="libpython2_7-1_0-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141606" comment="libpython2_7-1_0-32bit-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141607" comment="python-base-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141608" comment="python-devel-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141609" comment="python-xml-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00034.html" source="SUSE-SU"/>
    <description>
    builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512634" comment="xinetd-2.3.15-8.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" source="SUSE-SU"/>
    <description>
    CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00046.html" source="SUSE-SU"/>
    <description>
    The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141325" comment="expat-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141326" comment="libexpat1-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141327" comment="libexpat1-32bit-2.1.0-13.232 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0884" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0547-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<bugzilla href="https://bugzilla.suse.com/749210">SUSE bug 749210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749735">SUSE bug 749735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751977">SUSE bug 751977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754640">SUSE bug 754640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761819">SUSE bug 761819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012" source="SUSE CVE"/>
    <description>
    server/server_stubs.c in the kadmin protocol implementation in MIT Kerberos 5 (aka krb5) 1.10 before 1.10.1 does not properly restrict access to (1) SET_STRING and (2) GET_STRINGS operations, which might allow remote authenticated administrators to modify or read string attributes by leveraging the global list privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012</cve>
	<bugzilla href="https://bugzilla.suse.com/766109">SUSE bug 766109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0834-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00014.html" source="SUSE-SU"/>
    <description>
    The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013</cve>
	<bugzilla href="https://bugzilla.suse.com/765485">SUSE bug 765485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1014" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1014" ref_url="https://www.suse.com/security/cve/CVE-2012-1014" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0967-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html" source="SUSE-SU"/>
    <description>
    The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1014/">CVE-2012-1014</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1015" ref_url="https://www.suse.com/security/cve/CVE-2012-1015" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0967-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html" source="SUSE-SU"/>
    <description>
    The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x before 1.9.5, and 1.10.x before 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free, heap memory corruption, and daemon crash) via a crafted AS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1015/">CVE-2012-1015</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00069.html" source="SUSE-SU"/>
    <description>
    The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016</cve>
	<bugzilla href="https://bugzilla.suse.com/807556">SUSE bug 807556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<bugzilla href="https://bugzilla.suse.com/750937">SUSE bug 750937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<bugzilla href="https://bugzilla.suse.com/750947">SUSE bug 750947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<bugzilla href="https://bugzilla.suse.com/750942">SUSE bug 750942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<bugzilla href="https://bugzilla.suse.com/750952">SUSE bug 750952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<bugzilla href="https://bugzilla.suse.com/750951">SUSE bug 750951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<bugzilla href="https://bugzilla.suse.com/750953">SUSE bug 750953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<bugzilla href="https://bugzilla.suse.com/750950">SUSE bug 750950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<bugzilla href="https://bugzilla.suse.com/750940">SUSE bug 750940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<bugzilla href="https://bugzilla.suse.com/750945">SUSE bug 750945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<bugzilla href="https://bugzilla.suse.com/750946">SUSE bug 750946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<bugzilla href="https://bugzilla.suse.com/750939">SUSE bug 750939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<bugzilla href="https://bugzilla.suse.com/750943">SUSE bug 750943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<bugzilla href="https://bugzilla.suse.com/750941">SUSE bug 750941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<bugzilla href="https://bugzilla.suse.com/750938">SUSE bug 750938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<bugzilla href="https://bugzilla.suse.com/750954">SUSE bug 750954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<bugzilla href="https://bugzilla.suse.com/750955">SUSE bug 750955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<bugzilla href="https://bugzilla.suse.com/750948">SUSE bug 750948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<bugzilla href="https://bugzilla.suse.com/750949">SUSE bug 750949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<bugzilla href="https://bugzilla.suse.com/750944">SUSE bug 750944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00046.html" source="SUSE-SU"/>
    <description>
    readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141325" comment="expat-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141326" comment="libexpat1-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141327" comment="libexpat1-32bit-2.1.0-13.232 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141325" comment="expat-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141326" comment="libexpat1-2.1.0-13.232 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141327" comment="libexpat1-32bit-2.1.0-13.232 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755383">SUSE bug 755383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826682">SUSE bug 826682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141605" comment="libpython2_7-1_0-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141606" comment="libpython2_7-1_0-32bit-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141607" comment="python-base-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141608" comment="python-devel-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141609" comment="python-xml-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1152" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1000-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" source="SUSE-SU"/>
    <description>
    Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<bugzilla href="https://bugzilla.suse.com/751503">SUSE bug 751503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141773" comment="perl-YAML-LibYAML-0.38-7.61 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1162" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a zip archive with the number of directories set to 0, related to an "incorrect loop construct."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<bugzilla href="https://bugzilla.suse.com/751829">SUSE bug 751829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751830">SUSE bug 751830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141753" comment="libzip2-0.11.1-4.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142037" comment="libzip2-0.11.1-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164531" comment="libzip2-0.11.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1163" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to execute arbitrary code via the size and offset values for the central directory in a zip archive, which triggers "improper restrictions of operations within the bounds of a memory buffer" and an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<bugzilla href="https://bugzilla.suse.com/751829">SUSE bug 751829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751830">SUSE bug 751830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141753" comment="libzip2-0.11.1-4.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142037" comment="libzip2-0.11.1-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164531" comment="libzip2-0.11.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1165" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0474-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<bugzilla href="https://bugzilla.suse.com/749210">SUSE bug 749210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749213">SUSE bug 749213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751946">SUSE bug 751946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754640">SUSE bug 754640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1173" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0539-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<bugzilla href="https://bugzilla.suse.com/753362">SUSE bug 753362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767852">SUSE bug 767852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1174" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00030.html" source="SUSE-SU"/>
    <description>
    The rm_rf_children function in util.c in the systemd-logind login manager in systemd before 44, when logging out, allows local users to delete arbitrary files via a symlink attack on unspecified files, related to "particular records related with user session."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174</cve>
	<bugzilla href="https://bugzilla.suse.com/752281">SUSE bug 752281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140954" comment="libsystemd0-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140955" comment="libsystemd0-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140956" comment="libudev1-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140957" comment="libudev1-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140958" comment="systemd-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140959" comment="systemd-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140960" comment="systemd-bash-completion-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140961" comment="systemd-sysvinit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140962" comment="udev-228-117.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141527" comment="libgudev-1_0-0-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141528" comment="libgudev-1_0-0-32bit-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141529" comment="libudev1-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141530" comment="libudev1-32bit-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141531" comment="systemd-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141532" comment="systemd-32bit-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141533" comment="systemd-bash-completion-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141534" comment="systemd-sysvinit-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141535" comment="udev-210-44.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141971" comment="libgudev-1_0-0-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141972" comment="libgudev-1_0-0-32bit-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141973" comment="libudev1-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141974" comment="libudev1-32bit-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141975" comment="systemd-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141976" comment="systemd-32bit-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141977" comment="systemd-bash-completion-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141978" comment="systemd-sysvinit-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141979" comment="udev-210-83.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159206" comment="libsystemd0-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159207" comment="libsystemd0-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159208" comment="libudev1-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159209" comment="libudev1-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159210" comment="systemd-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159211" comment="systemd-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159212" comment="systemd-bash-completion-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159213" comment="systemd-sysvinit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159214" comment="udev-228-142.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0501-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1185" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0692-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the ResolutionUnit tag in the EXIF IFD0 of an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0247.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141196" comment="ImageMagick-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141197" comment="libMagick++-6_Q16-3-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141198" comment="libMagickCore-6_Q16-1-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141199" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141200" comment="libMagickWand-6_Q16-1-6.8.8.1-5.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1186" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0692-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141196" comment="ImageMagick-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141197" comment="libMagick++-6_Q16-3-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141198" comment="libMagickCore-6_Q16-1-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141199" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-5.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141200" comment="libMagickWand-6_Q16-1-6.8.8.1-5.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000176.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<bugzilla href="https://bugzilla.suse.com/753611">SUSE bug 753611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141235" comment="clamav-0.98.4-1.46 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000176.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<bugzilla href="https://bugzilla.suse.com/753613">SUSE bug 753613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141235" comment="clamav-0.98.4-1.46 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000176.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<bugzilla href="https://bugzilla.suse.com/753610">SUSE bug 753610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141235" comment="clamav-0.98.4-1.46 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1535" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1535" ref_url="https://www.suse.com/security/cve/CVE-2012-1535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1001-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted SWF content, as exploited in the wild in August 2012 with SWF content in a Word document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1535/">CVE-2012-1535</cve>
	<bugzilla href="https://bugzilla.suse.com/775986">SUSE bug 775986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00021.html" source="SUSE-SU"/>
    <description>
    The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<bugzilla href="https://bugzilla.suse.com/752193">SUSE bug 752193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753301">SUSE bug 753301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924966">SUSE bug 924966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00028.html" source="SUSE-SU"/>
    <description>
    file before 5.11 and libmagic allow remote attackers to cause a denial of service (crash) via a crafted Composite Document File (CDF) file that triggers (1) an out-of-bounds read or (2) an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571</cve>
	<bugzilla href="https://bugzilla.suse.com/753303">SUSE bug 753303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883306">SUSE bug 883306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884986">SUSE bug 884986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141330" comment="file-5.19-2.149 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141331" comment="file-magic-5.19-2.149 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141332" comment="libmagic1-5.19-2.149 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141333" comment="libmagic1-32bit-5.19-2.149 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512122" comment="file-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512123" comment="file-magic-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512124" comment="libmagic1-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512125" comment="libmagic1-32bit-5.22-10.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00021.html" source="SUSE-SU"/>
    <description>
    gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<bugzilla href="https://bugzilla.suse.com/752193">SUSE bug 752193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754223">SUSE bug 754223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0607-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00011.html" source="SUSE-SU"/>
    <description>
    mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1616" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in icclib before 2.13, as used by Argyll CMS before 1.4 and possibly other programs, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted ICC profile file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616</cve>
	<bugzilla href="https://bugzilla.suse.com/768322">SUSE bug 768322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141211" comment="argyllcms-1.6.3-1.179 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142077" comment="argyllcms-1.6.3-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-5" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-6" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<bugzilla href="https://bugzilla.suse.com/765315">SUSE bug 765315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1682" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "XMLDecoder security issue via ClassFinder."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1716" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000293.html" source="SUSE-SU"/>
		<reference ref_id="TID7011405" ref_url="https://www.suse.com/support/kb/doc/?id=7011405" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1723" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7011405" ref_url="https://www.suse.com/support/kb/doc/?id=7011405" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1724" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7011405" ref_url="https://www.suse.com/support/kb/doc/?id=7011405" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1725" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="TID7011405" ref_url="https://www.suse.com/support/kb/doc/?id=7011405" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1726" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by changing the size of a container of absolutely positioned elements in a column.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1950" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
    <description>
    The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::IsEventBased function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code by interacting with objects used for SMIL Timing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsTableFrame::InsertFrames function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly perform a cast of a frame variable during processing of mixed row-group and column-group frames, which might allow remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The ElementAnimations::EnsureStyleRuleFor function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (buffer over-read, incorrect pointer dereference, and heap-based buffer overflow) or possibly execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDocument::AdoptNode function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors involving multiple adoptions and empty documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to spoof the address bar via vectors involving history.forward and history.back calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    An unspecified parser-utility class in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly handle EMBED elements within description elements in RSS feeds, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a feed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsGlobalWindow::PageHidden function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 might allow remote attackers to execute arbitrary code via vectors related to focused content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not consider the presence of same-compartment security wrappers (SCSW) during the cross-compartment wrapping of objects, which allows remote attackers to bypass intended XBL access restrictions via crafted content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The qcms_transform_data_rgb_out_lut_sse2 function in the QCMS implementation in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 might allow remote attackers to obtain sensitive information from process memory via a crafted color profile that triggers an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly handle duplicate values in X-Frame-Options headers, which makes it easier for remote attackers to conduct clickjacking attacks via a FRAME element referencing a web site that produces these duplicate values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the JSDependentString::undepend function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving strings with multiple dependencies.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy (CSP) functionality in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly restrict the strings placed into the blocked-uri parameter of a violation report, which allows remote web servers to capture OpenID credentials and OAuth 2.0 access tokens by triggering a violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1965" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1970" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2034" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2034" ref_url="https://www.suse.com/security/cve/CVE-2012-2034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2037.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2034/">CVE-2012-2034</cve>
	<bugzilla href="https://bugzilla.suse.com/766241">SUSE bug 766241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2035" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2035" ref_url="https://www.suse.com/security/cve/CVE-2012-2035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2035/">CVE-2012-2035</cve>
	<bugzilla href="https://bugzilla.suse.com/766241">SUSE bug 766241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2036" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2036" ref_url="https://www.suse.com/security/cve/CVE-2012-2036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2036/">CVE-2012-2036</cve>
	<bugzilla href="https://bugzilla.suse.com/766241">SUSE bug 766241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2037" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2037" ref_url="https://www.suse.com/security/cve/CVE-2012-2037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2034.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2037/">CVE-2012-2037</cve>
	<bugzilla href="https://bugzilla.suse.com/766241">SUSE bug 766241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2038" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2038" ref_url="https://www.suse.com/security/cve/CVE-2012-2038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2038/">CVE-2012-2038</cve>
	<bugzilla href="https://bugzilla.suse.com/766241">SUSE bug 766241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2039" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2039" ref_url="https://www.suse.com/security/cve/CVE-2012-2039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2039/">CVE-2012-2039</cve>
	<bugzilla href="https://bugzilla.suse.com/766241">SUSE bug 766241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2040" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2040" ref_url="https://www.suse.com/security/cve/CVE-2012-2040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in the installer in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows local users to gain privileges via a Trojan horse executable file in an unspecified directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2040/">CVE-2012-2040</cve>
	<bugzilla href="https://bugzilla.suse.com/766241">SUSE bug 766241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1149-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021456" ref_url="https://www.suse.com/support/kb/doc/?id=7021456" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021736" ref_url="https://www.suse.com/support/kb/doc/?id=7021736" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021874" ref_url="https://www.suse.com/support/kb/doc/?id=7021874" source="SUSE-SU"/>
		<reference ref_id="TID7021991" ref_url="https://www.suse.com/support/kb/doc/?id=7021991" source="SUSE-SU"/>
		<reference ref_id="TID7022023" ref_url="https://www.suse.com/support/kb/doc/?id=7022023" source="SUSE-SU"/>
		<reference ref_id="TID7022090" ref_url="https://www.suse.com/support/kb/doc/?id=7022090" source="SUSE-SU"/>
		<reference ref_id="TID7022091" ref_url="https://www.suse.com/support/kb/doc/?id=7022091" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html" source="SUSE-SU"/>
    <description>
    The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0829-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00009.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<bugzilla href="https://bugzilla.suse.com/767852">SUSE bug 767852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2141" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0659-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00042.html" source="SUSE-SU"/>
    <description>
    Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<bugzilla href="https://bugzilla.suse.com/759352">SUSE bug 759352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826684">SUSE bug 826684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141682" comment="libsnmp30-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141683" comment="libsnmp30-32bit-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141684" comment="net-snmp-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141685" comment="perl-SNMP-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141686" comment="snmp-mibs-5.7.2.1-3.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512467" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512468" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512469" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512470" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512471" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2142" ref_url="https://www.suse.com/security/cve/CVE-2012-2142" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1371-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00049.html" source="SUSE-SU"/>
    <description>
    The error function in Error.cc in poppler before 0.21.4 allows remote attackers to execute arbitrary commands via a PDF containing an escape sequence for a terminal emulator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2142/">CVE-2012-2142</cve>
	<bugzilla href="https://bugzilla.suse.com/1133493">SUSE bug 1133493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834475">SUSE bug 834475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834476">SUSE bug 834476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334136" comment="evince is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1299-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<bugzilla href="https://bugzilla.suse.com/766797">SUSE bug 766797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766798">SUSE bug 766798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766799">SUSE bug 766799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1429-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00007.html" source="SUSE-SU"/>
    <description>
    xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141166" comment="xfsprogs-4.3.0-8.8 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159324" comment="xfsprogs-4.3.0-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512633" comment="xfsprogs-4.15.0-1.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514545" comment="xfsprogs-3.2.1-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2214" ref_url="https://www.suse.com/security/cve/CVE-2012-2214" source="SUSE CVE"/>
    <description>
    proxy.c in libpurple in Pidgin before 2.10.4 does not properly handle canceled SOCKS5 connection attempts, which allows user-assisted remote authenticated users to cause a denial of service (application crash) via a sequence of XMPP file-transfer requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2214/">CVE-2012-2214</cve>
	<bugzilla href="https://bugzilla.suse.com/760890">SUSE bug 760890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<bugzilla href="https://bugzilla.suse.com/761838">SUSE bug 761838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763341">SUSE bug 763341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0652-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00036.html" source="SUSE-SU"/>
    <description>
    sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<bugzilla href="https://bugzilla.suse.com/762327">SUSE bug 762327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826687">SUSE bug 826687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141810" comment="sudo-1.8.10p3-1.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0717-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the log_message_cb function in otr-plugin.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 3.2.1 for Pidgin might allow remote attackers to execute arbitrary code via format string specifiers in data that generates a log message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369</cve>
	<bugzilla href="https://bugzilla.suse.com/762498">SUSE bug 762498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141774" comment="pidgin-otr-4.0.0-6.18 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142148" comment="pidgin-otr-4.0.0-11.6 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159707" comment="pidgin-plugin-otr-4.0.2-1.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372</cve>
	<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2388" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00002.html" source="SUSE-SU"/>
    <description>
    The GMP Plugin in strongSwan 4.2.0 through 4.6.3 allows remote attackers to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA signature verification vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761325">SUSE bug 761325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141806" comment="strongswan-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141807" comment="strongswan-doc-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141808" comment="strongswan-ipsec-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141809" comment="strongswan-libs0-5.1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0657-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00041.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allows remote attackers to cause a denial of service (infinite loop) via vectors related to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP dissectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763855">SUSE bug 763855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769578">SUSE bug 769578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0657-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00041.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763855">SUSE bug 763855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763857">SUSE bug 763857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0657-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00041.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763859">SUSE bug 763859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0615-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00017.html" source="SUSE-SU"/>
    <description>
    VideoLAN VLC media player 2.0.1 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted MP4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396</cve>
	<bugzilla href="https://bugzilla.suse.com/760496">SUSE bug 760496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141698" comment="libtag1-32bit-1.9.1-1.265 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141699" comment="libtag_c0-32bit-1.9.1-1.265 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2451" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451" source="SUSE CVE"/>
    <description>
    The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack.  NOTE: some of these details are obtained from third party information.  NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<bugzilla href="https://bugzilla.suse.com/760459">SUSE bug 760459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1299-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<bugzilla href="https://bugzilla.suse.com/765069">SUSE bug 765069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2669" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000166.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<bugzilla href="https://bugzilla.suse.com/761200">SUSE bug 761200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140682" comment="hyper-v-7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141886" comment="hyper-v-6-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512189" comment="hyper-v-7-7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2673" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<bugzilla href="https://bugzilla.suse.com/765444">SUSE bug 765444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136646" comment="libgc1-7.2d-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140590" comment="libgc1-7.2d-3.77 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00072.html" source="SUSE-SU"/>
    <description>
    crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0845-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00016.html" source="SUSE-SU"/>
    <description>
    The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/768807">SUSE bug 768807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140439" comment="accountsservice-0.6.42-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140440" comment="accountsservice-lang-0.6.42-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140441" comment="libaccountsservice0-0.6.42-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140442" comment="typelib-1_0-AccountsService-1_0-0.6.42-14.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141205" comment="accountsservice-0.6.35-1.126 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141206" comment="accountsservice-lang-0.6.35-1.126 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141207" comment="libaccountsservice0-0.6.35-1.126 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141208" comment="typelib-1_0-AccountsService-1_0-0.6.35-1.126 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141843" comment="accountsservice-0.6.35-3.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141844" comment="accountsservice-lang-0.6.35-3.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141845" comment="libaccountsservice0-0.6.35-3.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141846" comment="typelib-1_0-AccountsService-1_0-0.6.35-3.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512025" comment="accountsservice-0.6.42-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512026" comment="accountsservice-lang-0.6.42-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512027" comment="libaccountsservice0-0.6.42-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512028" comment="typelib-1_0-AccountsService-1_0-0.6.42-16.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2738" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0931-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0933-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00003.html" source="SUSE-SU"/>
    <description>
    The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738</cve>
	<bugzilla href="https://bugzilla.suse.com/772761">SUSE bug 772761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141004" comment="libvte9-0.28.2-19.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141727" comment="libvte9-0.28.2-17.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    The exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    The exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the exif_entry_format_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    The exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    The mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-1682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422.  NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422.  This identifier is for a different vulnerability whose details are not public as of 20130114.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798521">SUSE bug 798521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3236" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3236" ref_url="https://www.suse.com/security/cve/CVE-2012-3236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000200.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html" source="SUSE-SU"/>
    <description>
    fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3236/">CVE-2012-3236</cve>
	<bugzilla href="https://bugzilla.suse.com/763595">SUSE bug 763595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768376">SUSE bug 768376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769565">SUSE bug 769565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3291" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3291" ref_url="https://www.suse.com/security/cve/CVE-2012-3291" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00186.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3291/">CVE-2012-3291</cve>
	<bugzilla href="https://bugzilla.suse.com/767616">SUSE bug 767616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512579" comment="openconnect-7.08-1.27 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512580" comment="openconnect-lang-7.08-1.27 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3355" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3355" ref_url="https://www.suse.com/security/cve/CVE-2012-3355" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0954-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00010.html" source="SUSE-SU"/>
    <description>
    (1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) LyricsTab.py in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3355/">CVE-2012-3355</cve>
	<bugzilla href="https://bugzilla.suse.com/768681">SUSE bug 768681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141799" comment="rhythmbox-3.0.2-1.92 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141800" comment="rhythmbox-lang-3.0.2-1.92 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142150" comment="rhythmbox-3.4-6.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142151" comment="rhythmbox-lang-3.4-6.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3374" ref_url="https://www.suse.com/security/cve/CVE-2012-3374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00009.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3374/">CVE-2012-3374</cve>
	<bugzilla href="https://bugzilla.suse.com/770304">SUSE bug 770304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00038.html" source="SUSE-SU"/>
    <description>
    The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786745">SUSE bug 786745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3401" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0955-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00011.html" source="SUSE-SU"/>
    <description>
    The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<bugzilla href="https://bugzilla.suse.com/770816">SUSE bug 770816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
    <description>
    The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<bugzilla href="https://bugzilla.suse.com/770891">SUSE bug 770891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412</cve>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3422" ref_url="https://www.suse.com/security/cve/CVE-2012-3422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0979-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" source="SUSE-SU"/>
    <description>
    The getFirstInTableInstance function in the IcedTea-Web plugin before 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web page, which causes an uninitialized memory location to be read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3422/">CVE-2012-3422</cve>
	<bugzilla href="https://bugzilla.suse.com/773458">SUSE bug 773458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818768">SUSE bug 818768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3423" ref_url="https://www.suse.com/security/cve/CVE-2012-3423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0979-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" source="SUSE-SU"/>
    <description>
    The IcedTea-Web plugin before 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote attackers to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3423/">CVE-2012-3423</cve>
	<bugzilla href="https://bugzilla.suse.com/773458">SUSE bug 773458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818768">SUSE bug 818768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430</cve>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
    <description>
    The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
    <description>
    Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3445" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0991-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html" source="SUSE-SU"/>
    <description>
    The virTypedParameterArrayClear function in libvirt 0.9.13 does not properly handle virDomain* API calls with typed parameters, which might allow remote authenticated users to cause a denial of service (libvirtd crash) via an RPC command with nparams set to zero, which triggers an out-of-bounds read or a free of an invalid pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<bugzilla href="https://bugzilla.suse.com/773955">SUSE bug 773955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3466" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00037.html" source="SUSE-SU"/>
    <description>
    GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466</cve>
	<bugzilla href="https://bugzilla.suse.com/775235">SUSE bug 775235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140630" comment="gnome-keyring-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140631" comment="gnome-keyring-32bit-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140632" comment="gnome-keyring-lang-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140633" comment="gnome-keyring-pam-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140634" comment="gnome-keyring-pam-32bit-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140635" comment="libgck-modules-gnome-keyring-3.20.0-27.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141394" comment="gnome-keyring-3.10.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141395" comment="gnome-keyring-32bit-3.10.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141396" comment="gnome-keyring-lang-3.10.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141397" comment="gnome-keyring-pam-3.10.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141398" comment="gnome-keyring-pam-32bit-3.10.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141399" comment="libgck-modules-gnome-keyring-3.10.1-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141876" comment="gnome-keyring-3.10.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141877" comment="gnome-keyring-32bit-3.10.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141878" comment="gnome-keyring-lang-3.10.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141879" comment="gnome-keyring-pam-3.10.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141880" comment="gnome-keyring-pam-32bit-3.10.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141881" comment="libgck-modules-gnome-keyring-3.10.1-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512160" comment="gnome-keyring-3.20.0-28.3.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512161" comment="gnome-keyring-32bit-3.20.0-28.3.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512162" comment="gnome-keyring-lang-3.20.0-28.3.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512163" comment="gnome-keyring-pam-3.20.0-28.3.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512164" comment="gnome-keyring-pam-32bit-3.20.0-28.3.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512165" comment="libgck-modules-gnome-keyring-3.20.0-28.3.18 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001966.html" source="SUSE-SU"/>
    <description>
    Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141329" comment="fetchmail-6.3.26-5.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1299-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<bugzilla href="https://bugzilla.suse.com/776523">SUSE bug 776523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1299-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<bugzilla href="https://bugzilla.suse.com/776524">SUSE bug 776524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1203-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3520" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3520" ref_url="https://www.suse.com/security/cve/CVE-2012-3520" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0261-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html" source="SUSE-SU"/>
    <description>
    The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3520/">CVE-2012-3520</cve>
	<bugzilla href="https://bugzilla.suse.com/776925">SUSE bug 776925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00051.html" source="SUSE-SU"/>
    <description>
    libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<bugzilla href="https://bugzilla.suse.com/697105">SUSE bug 697105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852781">SUSE bug 852781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912016">SUSE bug 912016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141373" comment="glib2-lang-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141374" comment="glib2-tools-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141375" comment="libgio-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141376" comment="libgio-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141377" comment="libgio-fam-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141378" comment="libglib-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141379" comment="libglib-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141380" comment="libgmodule-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141381" comment="libgmodule-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141382" comment="libgobject-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141383" comment="libgobject-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141384" comment="libgthread-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141385" comment="libgthread-2_0-0-32bit-2.38.2-5.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142107" comment="libgio-fam-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141373" comment="glib2-lang-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141374" comment="glib2-tools-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141375" comment="libgio-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141376" comment="libgio-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141377" comment="libgio-fam-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141378" comment="libglib-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141379" comment="libglib-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141380" comment="libgmodule-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141381" comment="libgmodule-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141382" comment="libgobject-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141383" comment="libgobject-2_0-0-32bit-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141384" comment="libgthread-2_0-0-2.38.2-5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141385" comment="libgthread-2_0-0-32bit-2.38.2-5.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142107" comment="libgio-fam-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142107" comment="libgio-fam-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3548" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548" source="SUSE CVE"/>
    <description>
    The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x through 1.6.10 and 1.8.x through 1.8.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field in a capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548</cve>
	<bugzilla href="https://bugzilla.suse.com/778000">SUSE bug 778000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1048-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0969-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<bugzilla href="https://bugzilla.suse.com/772945">SUSE bug 772945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0891-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<bugzilla href="https://bugzilla.suse.com/770828">SUSE bug 770828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3865" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0891-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<bugzilla href="https://bugzilla.suse.com/770829">SUSE bug 770829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3866" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3866" ref_url="https://www.suse.com/security/cve/CVE-2012-3866" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0891-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html" source="SUSE-SU"/>
    <description>
    lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3866/">CVE-2012-3866</cve>
	<bugzilla href="https://bugzilla.suse.com/770827">SUSE bug 770827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3867" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0891-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html" source="SUSE-SU"/>
    <description>
    lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<bugzilla href="https://bugzilla.suse.com/770833">SUSE bug 770833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868</cve>
	<bugzilla href="https://bugzilla.suse.com/772946">SUSE bug 772946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1234-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00105.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<bugzilla href="https://bugzilla.suse.com/780167">SUSE bug 780167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0 does not properly restrict navigation to the about:newtab page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers creation of a new tab and then a new window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a negative height value in a BMP image within a .ICO file, related to (1) improper handling of the transparency bitmask by the nsICODecoder component and (2) improper processing of the alpha channel by the nsBMPDecoder component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the (1) Silf::readClassMap and (2) Pass::readPass functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The DOMParser component in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 loads subresources during parsing of text/html data within an extension, which allows remote attackers to obtain sensitive information by providing crafted data to privileged extension code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 does not properly follow the security model of the location object, which allows remote attackers to bypass intended content-loading restrictions or possibly have unspecified other impact via vectors involving chrome code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The web console in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that injects this code and triggers an eval operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly implement the HTML5 Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after document.domain has been set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly perform a cast of an unspecified variable during use of the instanceof operator on a JavaScript object, which allows remote attackers to execute arbitrary code or cause a denial of service (assertion failure) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4024" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option).  NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<bugzilla href="https://bugzilla.suse.com/773015">SUSE bug 773015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141805" comment="squashfs-4.3-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4025" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025" source="SUSE CVE"/>
    <description>
    Integer overflow in the queue_init function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted block_log field in the superblock of a .sqsh file, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<bugzilla href="https://bugzilla.suse.com/773015">SUSE bug 773015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141805" comment="squashfs-4.3-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4048" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html" source="SUSE-SU"/>
    <description>
    The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4049" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4191" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The mozilla::net::FailDelayManager::Lookup function in the WebSockets implementation in Mozilla Firefox before 16.0.1, Thunderbird before 16.0.1, and SeaMonkey before 2.13.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4194" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4195" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4196" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4203" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
    <description>
    The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 does not consider the compartment during property filtering, which allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
    <description>
    The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4212" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4213" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEditor::FindNextLeafNode function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4217" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/780157">SUSE bug 780157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4286" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The pcapng_read_packet_block function in wiretap/pcapng.c in the pcap-ng file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted pcap-ng file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4287" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-mongo.c in the MongoDB dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a small value for a BSON document length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4293" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4294" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4295" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Array index error in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 might allow remote attackers to cause a denial of service (application crash) via a crafted speed (aka rate) value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4296" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4297" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x before 1.6.10 and 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4298" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4398" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398</cve>
	<bugzilla href="https://bugzilla.suse.com/778463">SUSE bug 778463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779488">SUSE bug 779488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor.  NOTE: this might be a duplicate of CVE-2007-0998.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848783">SUSE bug 848783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920169">SUSE bug 920169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4416" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<bugzilla href="https://bugzilla.suse.com/779714">SUSE bug 779714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4425" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425" source="SUSE CVE"/>
    <description>
    libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140943" comment="libspice-client-glib-2_0-8-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140944" comment="libspice-client-glib-helper-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140945" comment="libspice-client-gtk-2_0-4-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140946" comment="libspice-client-gtk-3_0-4-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140947" comment="libspice-controller0-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140948" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140949" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141691" comment="libspice-client-glib-2_0-8-0.25-3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141692" comment="libspice-client-gtk-2_0-4-0.25-3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141693" comment="libspice-client-gtk-3_0-4-0.25-3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141694" comment="libspice-controller0-0.25-3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141695" comment="typelib-1_0-SpiceClientGlib-2_0-0.25-3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141696" comment="typelib-1_0-SpiceClientGtk-3_0-0.25-3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142011" comment="libspice-client-glib-2_0-8-0.29-1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142012" comment="libspice-client-gtk-2_0-4-0.29-1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142013" comment="libspice-client-gtk-3_0-4-0.29-1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142014" comment="libspice-controller0-0.29-1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142015" comment="typelib-1_0-SpiceClientGlib-2_0-0.29-1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142016" comment="typelib-1_0-SpiceClientGtk-3_0-0.29-1.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159196" comment="libspice-client-glib-2_0-8-0.33-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159197" comment="libspice-client-glib-helper-0.33-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159198" comment="libspice-client-gtk-3_0-5-0.33-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159199" comment="libspice-controller0-0.33-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159200" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159201" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512476" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512477" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512478" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512479" comment="libspice-controller0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512480" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512481" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4433" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4433" ref_url="https://www.suse.com/security/cve/CVE-2012-4433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002695.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0828-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00093.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in operations/external/ppm-load.c in GEGL (Generic Graphics Library) 0.2.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a large (1) width or (2) height value in a Portable Pixel Map (ppm) image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4433/">CVE-2012-4433</cve>
	<bugzilla href="https://bugzilla.suse.com/1023636">SUSE bug 1023636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028070">SUSE bug 1028070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089725">SUSE bug 1089725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789835">SUSE bug 789835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149576" comment="gegl-0_2-0.2.0-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149577" comment="gegl-0_2-lang-0.2.0-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149578" comment="libgegl-0_2-0-0.2.0-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517165" comment="gegl-0_2-0.2.0-10.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517166" comment="gegl-0_2-lang-0.2.0-10.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517167" comment="libgegl-0_2-0-0.2.0-10.3.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518486" comment="gegl-0_2-0.2.0-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518487" comment="gegl-0_2-lang-0.2.0-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518488" comment="libgegl-0_2-0-0.2.0-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453" source="SUSE CVE"/>
    <description>
    dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453</cve>
	<bugzilla href="https://bugzilla.suse.com/1008340">SUSE bug 1008340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782734">SUSE bug 782734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009138243" comment="dracut-037-66.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140546" comment="dracut-044-87.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141301" comment="dracut-037-34.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158969" comment="dracut-044-113.10 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512113" comment="dracut-044.1-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4504" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00065.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140909" comment="libproxy1-0.4.13-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140910" comment="libproxy1-32bit-0.4.13-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140911" comment="libproxy1-config-gnome3-0.4.13-16.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140912" comment="libproxy1-config-gnome3-32bit-0.4.13-16.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140913" comment="libproxy1-networkmanager-0.4.13-16.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142142" comment="libproxy1-networkmanager-32bit-0.4.13-16.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140914" comment="libproxy1-pacrunner-webkit-0.4.13-16.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141595" comment="libproxy1-0.4.11-11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141596" comment="libproxy1-32bit-0.4.11-11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141597" comment="libproxy1-config-gnome3-0.4.11-11.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141598" comment="libproxy1-config-gnome3-32bit-0.4.11-11.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141599" comment="libproxy1-networkmanager-0.4.11-11.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141600" comment="libproxy1-networkmanager-32bit-0.4.11-11.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4510" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510" source="SUSE CVE"/>
    <description>
    cups-pk-helper before 0.2.3 does not properly wrap the (1) cupsGetFile and (2) cupsPutFile function calls, which allows user-assisted remote attackers to read or overwrite sensitive files using CUPS resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<bugzilla href="https://bugzilla.suse.com/783488">SUSE bug 783488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009138209" comment="cups-pk-helper-0.2.5-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009138210" comment="cups-pk-helper-lang-0.2.5-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140514" comment="cups-pk-helper-0.2.5-3.75 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140515" comment="cups-pk-helper-lang-0.2.5-3.75 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4524" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4524" ref_url="https://www.suse.com/security/cve/CVE-2012-4524" source="SUSE CVE"/>
    <description>
    xlockmore before 5.43 'dclock' security bypass vulnerability
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4524/">CVE-2012-4524</cve>
	<bugzilla href="https://bugzilla.suse.com/1160775">SUSE bug 1160775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338837" comment="xlockmore is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1524-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1511-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<bugzilla href="https://bugzilla.suse.com/787846">SUSE bug 787846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840572">SUSE bug 840572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4559" ref_url="https://www.suse.com/security/cve/CVE-2012-4559" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1622-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0130-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple double free vulnerabilities in the (1) agent_sign_data function in agent.c, (2) channel_request function in channels.c, (3) ssh_userauth_pubkey function in auth.c, (4) sftp_parse_attr_3 function in sftp.c, and (5) try_publickey_from_file function in keyfiles.c in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4559/">CVE-2012-4559</cve>
	<bugzilla href="https://bugzilla.suse.com/789827">SUSE bug 789827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141697" comment="libssh4-0.6.3-1.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4560" ref_url="https://www.suse.com/security/cve/CVE-2012-4560" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1622-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0130-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4560/">CVE-2012-4560</cve>
	<bugzilla href="https://bugzilla.suse.com/789827">SUSE bug 789827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141697" comment="libssh4-0.6.3-1.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4561" ref_url="https://www.suse.com/security/cve/CVE-2012-4561" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1622-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0130-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00021.html" source="SUSE-SU"/>
    <description>
    The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free "an invalid pointer on an error path," which might allow remote attackers to cause a denial of service (crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4561/">CVE-2012-4561</cve>
	<bugzilla href="https://bugzilla.suse.com/789827">SUSE bug 789827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141697" comment="libssh4-0.6.3-1.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0187-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00076.html" source="SUSE-SU"/>
    <description>
    ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<bugzilla href="https://bugzilla.suse.com/781995">SUSE bug 781995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787892">SUSE bug 787892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000289.html" source="SUSE-SU"/>
		<reference ref_id="TID7014254" ref_url="https://www.suse.com/support/kb/doc/?id=7014254" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1420-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0157-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1630-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00005.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793420">SUSE bug 793420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803004">SUSE bug 803004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847895">SUSE bug 847895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141157" comment="w3m-0.5.3-157.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141825" comment="w3m-0.5.3-153.145 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141826" comment="wget-1.14-4.83 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141825" comment="w3m-0.5.3-153.145 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102008" comment="wget-1.14-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5070" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5074" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality and integrity, related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5085" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking.  NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5086" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5087" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5112" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<bugzilla href="https://bugzilla.suse.com/786698">SUSE bug 786698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141549" comment="libjavascriptcoregtk-1_0-0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141550" comment="libjavascriptcoregtk-1_0-0-32bit-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141551" comment="libjavascriptcoregtk-3_0-0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141552" comment="libwebkit2gtk-3_0-25-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141553" comment="libwebkitgtk-1_0-0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141554" comment="libwebkitgtk-1_0-0-32bit-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141555" comment="libwebkitgtk-3_0-0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141556" comment="libwebkitgtk2-lang-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141557" comment="libwebkitgtk3-lang-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141558" comment="typelib-1_0-JavaScriptCore-3_0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141559" comment="typelib-1_0-WebKit-3_0-2.2.7-3.63 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5133" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<bugzilla href="https://bugzilla.suse.com/791234">SUSE bug 791234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141549" comment="libjavascriptcoregtk-1_0-0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141550" comment="libjavascriptcoregtk-1_0-0-32bit-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141551" comment="libjavascriptcoregtk-3_0-0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141552" comment="libwebkit2gtk-3_0-25-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141553" comment="libwebkitgtk-1_0-0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141554" comment="libwebkitgtk-1_0-0-32bit-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141555" comment="libwebkitgtk-3_0-0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141556" comment="libwebkitgtk2-lang-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141557" comment="libwebkitgtk3-lang-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141558" comment="typelib-1_0-JavaScriptCore-3_0-2.2.7-3.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141559" comment="typelib-1_0-WebKit-3_0-2.2.7-3.63 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791234">SUSE bug 791234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793334">SUSE bug 793334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804033">SUSE bug 804033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141788" comment="python-libxml2-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1390-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1390-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<bugzilla href="https://bugzilla.suse.com/784602">SUSE bug 784602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5237" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237" source="SUSE CVE"/>
    <description>
    The dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237</cve>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5238" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.3 uses incorrect OUI data structures during the decoding of (1) PPP and (2) LCP data, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238</cve>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5239" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-3548.  Reason: This candidate is a reservation duplicate of CVE-2012-3548.  Notes: All CVE users should reference CVE-2012-3548 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239</cve>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5240" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240" source="SUSE CVE"/>
    <description>
    Buffer overflow in the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240</cve>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5248" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5248" ref_url="https://www.suse.com/security/cve/CVE-2012-5248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5248/">CVE-2012-5248</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5249" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5249" ref_url="https://www.suse.com/security/cve/CVE-2012-5249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5249/">CVE-2012-5249</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5250" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5250" ref_url="https://www.suse.com/security/cve/CVE-2012-5250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5250/">CVE-2012-5250</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5251" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5251" ref_url="https://www.suse.com/security/cve/CVE-2012-5251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5251/">CVE-2012-5251</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5252" ref_url="https://www.suse.com/security/cve/CVE-2012-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5252/">CVE-2012-5252</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5253" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5253" ref_url="https://www.suse.com/security/cve/CVE-2012-5253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5253/">CVE-2012-5253</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5254" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5254" ref_url="https://www.suse.com/security/cve/CVE-2012-5254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5254/">CVE-2012-5254</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5255" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5255" ref_url="https://www.suse.com/security/cve/CVE-2012-5255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5255/">CVE-2012-5255</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5256" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5256" ref_url="https://www.suse.com/security/cve/CVE-2012-5256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5256/">CVE-2012-5256</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5257" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5257" ref_url="https://www.suse.com/security/cve/CVE-2012-5257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5257/">CVE-2012-5257</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5258" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5258" ref_url="https://www.suse.com/security/cve/CVE-2012-5258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5258/">CVE-2012-5258</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5259" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5259" ref_url="https://www.suse.com/security/cve/CVE-2012-5259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5259/">CVE-2012-5259</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5260" ref_url="https://www.suse.com/security/cve/CVE-2012-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5260/">CVE-2012-5260</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5261" ref_url="https://www.suse.com/security/cve/CVE-2012-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5261/">CVE-2012-5261</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5262" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5262" ref_url="https://www.suse.com/security/cve/CVE-2012-5262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5262/">CVE-2012-5262</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5263" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5263" ref_url="https://www.suse.com/security/cve/CVE-2012-5263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5263/">CVE-2012-5263</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5264" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5264" ref_url="https://www.suse.com/security/cve/CVE-2012-5264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5264/">CVE-2012-5264</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5265" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5265" ref_url="https://www.suse.com/security/cve/CVE-2012-5265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5265/">CVE-2012-5265</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5266" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5266" ref_url="https://www.suse.com/security/cve/CVE-2012-5266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5266/">CVE-2012-5266</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5267" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5267" ref_url="https://www.suse.com/security/cve/CVE-2012-5267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5267/">CVE-2012-5267</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5268" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5268" ref_url="https://www.suse.com/security/cve/CVE-2012-5268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5268/">CVE-2012-5268</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5269" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5269" ref_url="https://www.suse.com/security/cve/CVE-2012-5269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5269/">CVE-2012-5269</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5270" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5270" ref_url="https://www.suse.com/security/cve/CVE-2012-5270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5270/">CVE-2012-5270</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5271" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5271" ref_url="https://www.suse.com/security/cve/CVE-2012-5271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5271/">CVE-2012-5271</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5272" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5272" ref_url="https://www.suse.com/security/cve/CVE-2012-5272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5272/">CVE-2012-5272</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5274" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5274" ref_url="https://www.suse.com/security/cve/CVE-2012-5274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5275, CVE-2012-5276, CVE-2012-5277, and CVE-2012-5280.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5274/">CVE-2012-5274</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5275" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5275" ref_url="https://www.suse.com/security/cve/CVE-2012-5275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5276, CVE-2012-5277, and CVE-2012-5280.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5275/">CVE-2012-5275</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5276" ref_url="https://www.suse.com/security/cve/CVE-2012-5276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5275, CVE-2012-5277, and CVE-2012-5280.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5276/">CVE-2012-5276</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5277" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5277" ref_url="https://www.suse.com/security/cve/CVE-2012-5277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5275, CVE-2012-5276, and CVE-2012-5280.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5277/">CVE-2012-5277</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5278" ref_url="https://www.suse.com/security/cve/CVE-2012-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allow attackers to bypass intended access restrictions and execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5278/">CVE-2012-5278</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5279" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5279" ref_url="https://www.suse.com/security/cve/CVE-2012-5279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5279/">CVE-2012-5279</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5280" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5280" ref_url="https://www.suse.com/security/cve/CVE-2012-5280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5275, CVE-2012-5276, and CVE-2012-5277.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5280/">CVE-2012-5280</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00017.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in iconvert.c in the bogolexer component in Bogofilter before 1.2.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an email containing a base64 string that is decoded to incomplete multibyte characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<bugzilla href="https://bugzilla.suse.com/792939">SUSE bug 792939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131108" comment="bogofilter-1.2.4-5.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141230" comment="bogofilter-1.2.4-3.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<bugzilla href="https://bugzilla.suse.com/789945">SUSE bug 789945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<bugzilla href="https://bugzilla.suse.com/789944">SUSE bug 789944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<bugzilla href="https://bugzilla.suse.com/789951">SUSE bug 789951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<bugzilla href="https://bugzilla.suse.com/789948">SUSE bug 789948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789988">SUSE bug 789988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<bugzilla href="https://bugzilla.suse.com/789950">SUSE bug 789950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" source="SUSE-SU"/>
    <description>
    CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<bugzilla href="https://bugzilla.suse.com/1180148">SUSE bug 1180148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882905">SUSE bug 882905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514763" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514764" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514765" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514766" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5525" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525" source="SUSE CVE"/>
    <description>
    The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<bugzilla href="https://bugzilla.suse.com/789952">SUSE bug 789952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5532" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532" source="SUSE CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<bugzilla href="https://bugzilla.suse.com/791605">SUSE bug 791605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140682" comment="hyper-v-7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141886" comment="hyper-v-6-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512189" comment="hyper-v-7-7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<bugzilla href="https://bugzilla.suse.com/791372">SUSE bug 791372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5592" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6052.  Reason: This candidate is a reservation duplicate of CVE-2012-6052.  Notes: All CVE users should reference CVE-2012-6052 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5593" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6053.  Reason: This candidate is a reservation duplicate of CVE-2012-6053.  Notes: All CVE users should reference CVE-2012-6053 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5594" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6054.  Reason: This candidate is a reservation duplicate of CVE-2012-6054.  Notes: All CVE users should reference CVE-2012-6054 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6056.  Reason: This candidate is a reservation duplicate of CVE-2012-6056.  Notes: All CVE users should reference CVE-2012-6056 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5596" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6057.  Reason: This candidate is a reservation duplicate of CVE-2012-6057.  Notes: All CVE users should reference CVE-2012-6057 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6059.  Reason: This candidate is a reservation duplicate of CVE-2012-6059.  Notes: All CVE users should reference CVE-2012-6059 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6060.  Reason: This candidate is a reservation duplicate of CVE-2012-6060.  Notes: All CVE users should reference CVE-2012-6060 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6061.  Reason: This candidate is a reservation duplicate of CVE-2012-6061.  Notes: All CVE users should reference CVE-2012-6061 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6062.  Reason: This candidate is a reservation duplicate of CVE-2012-6062.  Notes: All CVE users should reference CVE-2012-6062 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5601" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6055.  Reason: This candidate is a reservation duplicate of CVE-2012-6055.  Notes: All CVE users should reference CVE-2012-6055 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5602" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason: This candidate is a reservation duplicate of CVE-2012-6058.  Notes: All CVE users should reference CVE-2012-6058 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<bugzilla href="https://bugzilla.suse.com/792440">SUSE bug 792440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5676" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5676" ref_url="https://www.suse.com/security/cve/CVE-2012-5676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on Windows, before 10.3.183.48 and 11.x before 11.5.502.136 on Mac OS X, before 10.3.183.48 and 11.x before 11.2.202.258 on Linux, before 11.1.111.29 on Android 2.x and 3.x, and before 11.1.115.34 on Android 4.x; Adobe AIR before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X; and Adobe AIR SDK before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5676/">CVE-2012-5676</cve>
	<bugzilla href="https://bugzilla.suse.com/794062">SUSE bug 794062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5677" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5677" ref_url="https://www.suse.com/security/cve/CVE-2012-5677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on Windows, before 10.3.183.48 and 11.x before 11.5.502.136 on Mac OS X, before 10.3.183.48 and 11.x before 11.2.202.258 on Linux, before 11.1.111.29 on Android 2.x and 3.x, and before 11.1.115.34 on Android 4.x; Adobe AIR before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X; and Adobe AIR SDK before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5677/">CVE-2012-5677</cve>
	<bugzilla href="https://bugzilla.suse.com/794062">SUSE bug 794062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5678" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5678" ref_url="https://www.suse.com/security/cve/CVE-2012-5678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on Windows, before 10.3.183.48 and 11.x before 11.5.502.136 on Mac OS X, before 10.3.183.48 and 11.x before 11.2.202.258 on Linux, before 11.1.111.29 on Android 2.x and 3.x, and before 11.1.115.34 on Android 4.x; Adobe AIR before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X; and Adobe AIR SDK before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5678/">CVE-2012-5678</cve>
	<bugzilla href="https://bugzilla.suse.com/794062">SUSE bug 794062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1649-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688</cve>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5689" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689" source="SUSE CVE"/>
    <description>
    ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689</cve>
	<bugzilla href="https://bugzilla.suse.com/800822">SUSE bug 800822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5837" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web Developer Toolbar in Mozilla Firefox before 17.0 executes script with chrome privileges, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5838" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The copyTexImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via large image dimensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6093" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0256-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html" source="SUSE-SU"/>
    <description>
    The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6094" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094" source="SUSE CVE"/>
    <description>
    cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094</cve>
	<bugzilla href="https://bugzilla.suse.com/795624">SUSE bug 795624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857372">SUSE bug 857372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6128" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6128" ref_url="https://www.suse.com/security/cve/CVE-2012-6128" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00115.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6128/">CVE-2012-6128</cve>
	<bugzilla href="https://bugzilla.suse.com/803347">SUSE bug 803347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512579" comment="openconnect-7.08-1.27 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512580" comment="openconnect-lang-7.08-1.27 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6647" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6647" ref_url="https://www.suse.com/security/cve/CVE-2012-6647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6647/">CVE-2012-6647</cve>
	<bugzilla href="https://bugzilla.suse.com/878289">SUSE bug 878289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6689" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6689" ref_url="https://www.suse.com/security/cve/CVE-2012-6689" source="SUSE CVE"/>
    <description>
    The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6689/">CVE-2012-6689</cve>
	<bugzilla href="https://bugzilla.suse.com/920170">SUSE bug 920170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6701" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6701" ref_url="https://www.suse.com/security/cve/CVE-2012-6701" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Integer overflow in fs/aio.c in the Linux kernel before 3.4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-12-25"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6701/">CVE-2012-6701</cve>
	<bugzilla href="https://bugzilla.suse.com/969354">SUSE bug 969354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969355">SUSE bug 969355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00071.html" source="SUSE-SU"/>
    <description>
    Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517085" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517086" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517087" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6703" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6703" ref_url="https://www.suse.com/security/cve/CVE-2012-6703" source="SUSE CVE"/>
    <description>
    Integer overflow in the snd_compr_allocate_buffer function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.6-rc6-next-20120917 allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6703/">CVE-2012-6703</cve>
	<bugzilla href="https://bugzilla.suse.com/986811">SUSE bug 986811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986941">SUSE bug 986941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6704" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704</cve>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6706" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1658-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
    <description>
    A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157766" comment="unrar-5.0.14-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519046" comment="clamav-0.99.4-33.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157766" comment="unrar-5.0.14-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519046" comment="clamav-0.99.4-33.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517671" comment="unrar-5.0.14-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6711" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6711" ref_url="https://www.suse.com/security/cve/CVE-2012-6711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006142.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6711/">CVE-2012-6711</cve>
	<bugzilla href="https://bugzilla.suse.com/1138676">SUSE bug 1138676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334330" comment="bash is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6712" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6712" ref_url="https://www.suse.com/security/cve/CVE-2012-6712" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 3.4, a buffer overflow occurs in drivers/net/wireless/iwlwifi/iwl-agn-sta.c, which will cause at least memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6712/">CVE-2012-6712</cve>
	<bugzilla href="https://bugzilla.suse.com/1143176">SUSE bug 1143176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0151" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings and host OS crash) by leveraging administrative access to an HVM guest in a domain with a large number of VCPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<bugzilla href="https://bugzilla.suse.com/797285">SUSE bug 797285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0152" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152" source="SUSE CVE"/>
    <description>
    Memory leak in Xen 4.2 and unstable allows local HVM guests to cause a denial of service (host memory consumption) by performing nested virtualization in a way that triggers errors that are not properly handled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<bugzilla href="https://bugzilla.suse.com/797287">SUSE bug 797287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800798">SUSE bug 800798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
    <description>
    The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800802">SUSE bug 800802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0157" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157" source="SUSE CVE"/>
    <description>
    (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157</cve>
	<bugzilla href="https://bugzilla.suse.com/797002">SUSE bug 797002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140779" comment="libblkid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140780" comment="libblkid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140781" comment="libfdisk1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140782" comment="libmount1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140783" comment="libmount1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140784" comment="libsmartcols1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142130" comment="libuuid-devel-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140785" comment="libuuid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140786" comment="libuuid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140787" comment="python-libmount-2.28-40.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140788" comment="util-linux-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140789" comment="util-linux-lang-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140790" comment="util-linux-systemd-2.28-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140791" comment="uuidd-2.28-40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141443" comment="libblkid1-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141444" comment="libblkid1-32bit-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141445" comment="libmount1-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141446" comment="libmount1-32bit-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141447" comment="libsmartcols1-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141448" comment="libuuid-devel-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141449" comment="libuuid1-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141450" comment="libuuid1-32bit-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141451" comment="python-libmount-2.25-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141452" comment="util-linux-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141453" comment="util-linux-lang-2.25-6.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141454" comment="util-linux-systemd-2.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141455" comment="uuidd-2.25-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141904" comment="libblkid1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141905" comment="libblkid1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141906" comment="libmount1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141907" comment="libmount1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141908" comment="libsmartcols1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141909" comment="libuuid-devel-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141910" comment="libuuid1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141911" comment="libuuid1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141912" comment="python-libmount-2.25-30.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141913" comment="util-linux-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141914" comment="util-linux-lang-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141915" comment="util-linux-systemd-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141916" comment="uuidd-2.25-30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159070" comment="libblkid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159071" comment="libblkid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159072" comment="libfdisk1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159073" comment="libmount1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159074" comment="libmount1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159075" comment="libsmartcols1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159649" comment="libuuid-devel-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159076" comment="libuuid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159077" comment="libuuid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159078" comment="python-libmount-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159079" comment="util-linux-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159080" comment="util-linux-lang-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159081" comment="util-linux-systemd-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159082" comment="uuidd-2.29.2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512244" comment="libblkid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512245" comment="libblkid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512246" comment="libfdisk1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512247" comment="libmount1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512248" comment="libmount1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512249" comment="libsmartcols1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512250" comment="libuuid-devel-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512251" comment="libuuid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512252" comment="libuuid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512253" comment="python-libmount-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512254" comment="util-linux-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512255" comment="util-linux-lang-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512256" comment="util-linux-systemd-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512257" comment="uuidd-2.29.2-7.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813366">SUSE bug 813366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833408">SUSE bug 833408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID7017793" ref_url="https://www.suse.com/support/kb/doc/?id=7017793" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<bugzilla href="https://bugzilla.suse.com/1070148">SUSE bug 1070148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103036">SUSE bug 1103036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103597">SUSE bug 1103597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804654">SUSE bug 804654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813366">SUSE bug 813366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<bugzilla href="https://bugzilla.suse.com/800976">SUSE bug 800976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172" source="SUSE CVE"/>
    <description>
    Samba 4.0.x before 4.0.1, in certain Active Directory domain-controller configurations, does not properly interpret Access Control Entries that are based on an objectClass, which allows remote authenticated users to bypass intended restrictions on modifying LDAP directory objects by leveraging (1) objectClass access by a user, (2) objectClass access by a group, or (3) write access to an attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<bugzilla href="https://bugzilla.suse.com/798364">SUSE bug 798364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0176" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0176" ref_url="https://www.suse.com/security/cve/CVE-2013-0176" source="SUSE CVE"/>
    <description>
    The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a "Client: Diffie-Hellman Key Exchange Init" packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0176/">CVE-2013-0176</cve>
	<bugzilla href="https://bugzilla.suse.com/802631">SUSE bug 802631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928323">SUSE bug 928323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141697" comment="libssh4-0.6.3-1.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0211" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001328.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0568-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<bugzilla href="https://bugzilla.suse.com/800024">SUSE bug 800024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979005">SUSE bug 979005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108423" comment="libarchive13-3.1.2-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514629" comment="libarchive13-3.1.2-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0281-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800982">SUSE bug 800982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0281-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216</cve>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800801">SUSE bug 800801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0217" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0217" ref_url="https://www.suse.com/security/cve/CVE-2013-0217" source="SUSE CVE"/>
    <description>
    Memory leak in drivers/net/xen-netback/netback.c in the Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (memory consumption) by triggering certain error conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0217/">CVE-2013-0217</cve>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800801">SUSE bug 800801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0219" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219" source="SUSE CVE"/>
    <description>
    System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<bugzilla href="https://bugzilla.suse.com/801036">SUSE bug 801036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141537" comment="libipa_hbac0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141538" comment="libsss_idmap0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141539" comment="python-sssd-config-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141540" comment="sssd-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141541" comment="sssd-32bit-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141542" comment="sssd-ad-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141543" comment="sssd-ipa-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141544" comment="sssd-krb5-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141545" comment="sssd-krb5-common-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141546" comment="sssd-ldap-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141547" comment="sssd-proxy-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141548" comment="sssd-tools-1.11.5.1-5.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141980" comment="libipa_hbac0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141981" comment="libsss_idmap0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141982" comment="libsss_sudo-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141983" comment="python-sssd-config-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141984" comment="sssd-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141985" comment="sssd-32bit-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141986" comment="sssd-ad-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141987" comment="sssd-ipa-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141988" comment="sssd-krb5-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141989" comment="sssd-krb5-common-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141990" comment="sssd-ldap-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141991" comment="sssd-proxy-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141992" comment="sssd-tools-1.11.5.1-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159140" comment="libipa_hbac0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159141" comment="libsss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159142" comment="libsss_nss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159143" comment="libsss_sudo-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159144" comment="python-sssd-config-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159145" comment="sssd-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159146" comment="sssd-32bit-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159147" comment="sssd-ad-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159148" comment="sssd-ipa-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159149" comment="sssd-krb5-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159150" comment="sssd-krb5-common-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159151" comment="sssd-ldap-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159152" comment="sssd-proxy-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159153" comment="sssd-tools-1.13.4-33.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512322" comment="libipa_hbac0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512323" comment="libsss_certmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512324" comment="libsss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512325" comment="libsss_nss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512326" comment="libsss_simpleifp0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166514" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512327" comment="python-sssd-config-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512328" comment="sssd-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512329" comment="sssd-32bit-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512330" comment="sssd-ad-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512331" comment="sssd-ipa-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512332" comment="sssd-krb5-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512333" comment="sssd-krb5-common-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512334" comment="sssd-ldap-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512335" comment="sssd-proxy-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512336" comment="sssd-tools-1.16.1-2.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0220" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220" source="SUSE CVE"/>
    <description>
    The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) before 1.9.4 allow remote attackers to cause a denial of service (out-of-bounds read, crash, and restart) via a crafted SSSD packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<bugzilla href="https://bugzilla.suse.com/801036">SUSE bug 801036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141537" comment="libipa_hbac0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141538" comment="libsss_idmap0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141539" comment="python-sssd-config-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141540" comment="sssd-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141541" comment="sssd-32bit-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141542" comment="sssd-ad-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141543" comment="sssd-ipa-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141544" comment="sssd-krb5-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141545" comment="sssd-krb5-common-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141546" comment="sssd-ldap-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141547" comment="sssd-proxy-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141548" comment="sssd-tools-1.11.5.1-5.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141980" comment="libipa_hbac0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141981" comment="libsss_idmap0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141982" comment="libsss_sudo-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141983" comment="python-sssd-config-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141984" comment="sssd-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141985" comment="sssd-32bit-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141986" comment="sssd-ad-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141987" comment="sssd-ipa-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141988" comment="sssd-krb5-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141989" comment="sssd-krb5-common-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141990" comment="sssd-ldap-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141991" comment="sssd-proxy-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141992" comment="sssd-tools-1.11.5.1-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159140" comment="libipa_hbac0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159141" comment="libsss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159142" comment="libsss_nss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159143" comment="libsss_sudo-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159144" comment="python-sssd-config-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159145" comment="sssd-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159146" comment="sssd-32bit-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159147" comment="sssd-ad-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159148" comment="sssd-ipa-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159149" comment="sssd-krb5-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159150" comment="sssd-krb5-common-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159151" comment="sssd-ldap-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159152" comment="sssd-proxy-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159153" comment="sssd-tools-1.13.4-33.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512322" comment="libipa_hbac0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512323" comment="libsss_certmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512324" comment="libsss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512325" comment="libsss_nss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512326" comment="libsss_simpleifp0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166514" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512327" comment="python-sssd-config-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512328" comment="sssd-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512329" comment="sssd-32bit-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512330" comment="sssd-ad-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512331" comment="sssd-ipa-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512332" comment="sssd-krb5-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512333" comment="sssd-krb5-common-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512334" comment="sssd-ldap-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512335" comment="sssd-proxy-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512336" comment="sssd-tools-1.16.1-2.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114699" comment="coreutils-8.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114700" comment="coreutils-lang-8.22-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141243" comment="coreutils-8.22-5.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141244" comment="coreutils-lang-8.22-5.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512066" comment="coreutils-8.25-13.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512067" comment="coreutils-lang-8.25-13.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114699" comment="coreutils-8.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114700" comment="coreutils-lang-8.22-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141243" comment="coreutils-8.22-5.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141244" comment="coreutils-lang-8.22-5.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512066" comment="coreutils-8.25-13.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512067" comment="coreutils-lang-8.25-13.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114699" comment="coreutils-8.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114700" comment="coreutils-lang-8.22-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141243" comment="coreutils-8.22-5.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141244" comment="coreutils-lang-8.22-5.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512066" comment="coreutils-8.25-13.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512067" comment="coreutils-lang-8.25-13.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0301-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html" source="SUSE-SU"/>
    <description>
    Gnome Online Accounts (GOA) 3.4.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.5, does not properly validate SSL certificates when creating accounts such as Windows Live and Facebook accounts, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240</cve>
	<bugzilla href="https://bugzilla.suse.com/802409">SUSE bug 802409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808534">SUSE bug 808534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141400" comment="gnome-online-accounts-3.10.5-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141401" comment="gnome-online-accounts-lang-3.10.5-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141402" comment="libgoa-1_0-0-3.10.5-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141403" comment="libgoa-backend-1_0-1-3.10.5-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141404" comment="typelib-1_0-Goa-1_0-3.10.5-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142108" comment="gnome-online-accounts-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142109" comment="gnome-online-accounts-lang-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140636" comment="libgoa-1_0-0-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142110" comment="libgoa-1_0-0-32bit-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140637" comment="libgoa-backend-1_0-1-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142111" comment="typelib-1_0-Goa-1_0-3.20.4-7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159641" comment="gnome-online-accounts-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159642" comment="gnome-online-accounts-lang-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159138" comment="libgoa-1_0-0-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159643" comment="libgoa-1_0-0-32bit-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159139" comment="libgoa-backend-1_0-1-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159644" comment="typelib-1_0-Goa-1_0-3.20.5-9.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848783">SUSE bug 848783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249</cve>
	<bugzilla href="https://bugzilla.suse.com/802411">SUSE bug 802411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0403-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0411-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00019.html" source="SUSE-SU"/>
    <description>
    The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00060.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803057">SUSE bug 803057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00041.html" source="SUSE-SU"/>
    <description>
    The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00041.html" source="SUSE-SU"/>
    <description>
    sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00041.html" source="SUSE-SU"/>
    <description>
    upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0287" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0559-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00115.html" source="SUSE-SU"/>
    <description>
    The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<bugzilla href="https://bugzilla.suse.com/809153">SUSE bug 809153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141537" comment="libipa_hbac0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141538" comment="libsss_idmap0-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141539" comment="python-sssd-config-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141540" comment="sssd-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141541" comment="sssd-32bit-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141542" comment="sssd-ad-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141543" comment="sssd-ipa-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141544" comment="sssd-krb5-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141545" comment="sssd-krb5-common-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141546" comment="sssd-ldap-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141547" comment="sssd-proxy-1.11.5.1-5.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141548" comment="sssd-tools-1.11.5.1-5.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141980" comment="libipa_hbac0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141981" comment="libsss_idmap0-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141982" comment="libsss_sudo-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141983" comment="python-sssd-config-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141984" comment="sssd-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141985" comment="sssd-32bit-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141986" comment="sssd-ad-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141987" comment="sssd-ipa-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141988" comment="sssd-krb5-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141989" comment="sssd-krb5-common-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141990" comment="sssd-ldap-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141991" comment="sssd-proxy-1.11.5.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141992" comment="sssd-tools-1.11.5.1-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159140" comment="libipa_hbac0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159141" comment="libsss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159142" comment="libsss_nss_idmap0-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159143" comment="libsss_sudo-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159144" comment="python-sssd-config-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159145" comment="sssd-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159146" comment="sssd-32bit-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159147" comment="sssd-ad-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159148" comment="sssd-ipa-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159149" comment="sssd-krb5-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159150" comment="sssd-krb5-common-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159151" comment="sssd-ldap-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159152" comment="sssd-proxy-1.13.4-33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159153" comment="sssd-tools-1.13.4-33.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512322" comment="libipa_hbac0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512323" comment="libsss_certmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512324" comment="libsss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512325" comment="libsss_nss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512326" comment="libsss_simpleifp0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166514" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512327" comment="python-sssd-config-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512328" comment="sssd-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512329" comment="sssd-32bit-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512330" comment="sssd-ad-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512331" comment="sssd-ipa-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512332" comment="sssd-krb5-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512333" comment="sssd-krb5-common-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512334" comment="sssd-ldap-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512335" comment="sssd-proxy-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512336" comment="sssd-tools-1.16.1-2.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0292" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292" source="SUSE CVE"/>
    <description>
    The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<bugzilla href="https://bugzilla.suse.com/792095">SUSE bug 792095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804392">SUSE bug 804392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0552-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0555-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00114.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805233">SUSE bug 805233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422" source="SUSE CVE"/>
		<reference ref_id="TID7011765" ref_url="https://www.suse.com/support/kb/doc/?id=7011765" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021874" ref_url="https://www.suse.com/support/kb/doc/?id=7021874" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114.  CVE-2013-0422 covers both the JMX/MBean and Reflection API issues.  NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks.  NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11.  If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798521">SUSE bug 798521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect checks for proxy classes" in the Reflection API.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0429" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0431" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU.  Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka "missing serialization restriction."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a "small subgroup attack" to force the use of weak session keys or obtain sensitive information about the private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient checks for cached results" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0933-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00070.html" source="SUSE-SU"/>
    <description>
    The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<bugzilla href="https://bugzilla.suse.com/811975">SUSE bug 811975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0504" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0504" ref_url="https://www.suse.com/security/cve/CVE-2013-0504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00012.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the broker service in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0504/">CVE-2013-0504</cve>
	<bugzilla href="https://bugzilla.suse.com/806415">SUSE bug 806415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867808">SUSE bug 867808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0630" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0630" ref_url="https://www.suse.com/security/cve/CVE-2013-0630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0128-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0168-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0630/">CVE-2013-0630</cve>
	<bugzilla href="https://bugzilla.suse.com/797442">SUSE bug 797442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0633" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0633" ref_url="https://www.suse.com/security/cve/CVE-2013-0633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0279-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00006.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0633/">CVE-2013-0633</cve>
	<bugzilla href="https://bugzilla.suse.com/802809">SUSE bug 802809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0634" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0634" ref_url="https://www.suse.com/security/cve/CVE-2013-0634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0279-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0634/">CVE-2013-0634</cve>
	<bugzilla href="https://bugzilla.suse.com/802809">SUSE bug 802809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0637" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0637" ref_url="https://www.suse.com/security/cve/CVE-2013-0637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0637/">CVE-2013-0637</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0638" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0638" ref_url="https://www.suse.com/security/cve/CVE-2013-0638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-0647.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0638/">CVE-2013-0638</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0639" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0639" ref_url="https://www.suse.com/security/cve/CVE-2013-0639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0639/">CVE-2013-0639</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0642" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0642" ref_url="https://www.suse.com/security/cve/CVE-2013-0642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0642/">CVE-2013-0642</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0643" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0643" ref_url="https://www.suse.com/security/cve/CVE-2013-0643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html" source="SUSE-SU"/>
    <description>
    The Firefox sandbox in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, does not properly restrict privileges, which makes it easier for remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0643/">CVE-2013-0643</cve>
	<bugzilla href="https://bugzilla.suse.com/806415">SUSE bug 806415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0644" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0644" ref_url="https://www.suse.com/security/cve/CVE-2013-0644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0649 and CVE-2013-1374.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0644/">CVE-2013-0644</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0645" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0645" ref_url="https://www.suse.com/security/cve/CVE-2013-0645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0645/">CVE-2013-0645</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0646" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0646" ref_url="https://www.suse.com/security/cve/CVE-2013-0646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK &amp; Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0646/">CVE-2013-0646</cve>
	<bugzilla href="https://bugzilla.suse.com/808973">SUSE bug 808973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0647" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0647" ref_url="https://www.suse.com/security/cve/CVE-2013-0647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-0638.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0647/">CVE-2013-0647</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0648" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0648" ref_url="https://www.suse.com/security/cve/CVE-2013-0648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the ExternalInterface ActionScript functionality in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0648/">CVE-2013-0648</cve>
	<bugzilla href="https://bugzilla.suse.com/806415">SUSE bug 806415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0649" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0649" ref_url="https://www.suse.com/security/cve/CVE-2013-0649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0644 and CVE-2013-1374.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0649/">CVE-2013-0649</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0650" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0650" ref_url="https://www.suse.com/security/cve/CVE-2013-0650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK &amp; Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0650/">CVE-2013-0650</cve>
	<bugzilla href="https://bugzilla.suse.com/808973">SUSE bug 808973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The AutoWrapperChanger class in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly interact with garbage collection, which allows remote attackers to execute arbitrary code via a crafted HTML document referencing JavaScript objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0 on Android and SeaMonkey before 2.15 do not restrict a touch event to a single IFRAME element, which allows remote attackers to obtain sensitive information or possibly conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XBL file with multiple bindings that have SVG content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozVibrate implementation in the Vibrate library in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors related to the domDoc pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 do not prevent multiple wrapping of WebIDL objects, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gfxTextRun::ShrinkToLigatureBoundaries function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent JavaScript workers from reading the browser-profile directory name, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDisplayBoxShadowOuter::Paint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    The ClusterIterator::NextCluster function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0779" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    The nsCodingStateMachine::NextState function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0781" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsPrintEngine::CommonPrint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0465-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0466-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0467-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00078.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807487">SUSE bug 807487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809386">SUSE bug 809386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<bugzilla href="https://bugzilla.suse.com/808829">SUSE bug 808829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1365" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1365" ref_url="https://www.suse.com/security/cve/CVE-2013-1365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1365/">CVE-2013-1365</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1366" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1366" ref_url="https://www.suse.com/security/cve/CVE-2013-1366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1366/">CVE-2013-1366</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1367" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1367" ref_url="https://www.suse.com/security/cve/CVE-2013-1367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1367/">CVE-2013-1367</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1368" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1368" ref_url="https://www.suse.com/security/cve/CVE-2013-1368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1368/">CVE-2013-1368</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1369" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1369" ref_url="https://www.suse.com/security/cve/CVE-2013-1369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1369/">CVE-2013-1369</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1370" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1370" ref_url="https://www.suse.com/security/cve/CVE-2013-1370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1370/">CVE-2013-1370</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1371" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1371" ref_url="https://www.suse.com/security/cve/CVE-2013-1371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK &amp; Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1371/">CVE-2013-1371</cve>
	<bugzilla href="https://bugzilla.suse.com/808973">SUSE bug 808973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1372" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1372" ref_url="https://www.suse.com/security/cve/CVE-2013-1372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1372/">CVE-2013-1372</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1373" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1373" ref_url="https://www.suse.com/security/cve/CVE-2013-1373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, and CVE-2013-1372.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1373/">CVE-2013-1373</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1374" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1374" ref_url="https://www.suse.com/security/cve/CVE-2013-1374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0644 and CVE-2013-0649.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1374/">CVE-2013-1374</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1375" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1375" ref_url="https://www.suse.com/security/cve/CVE-2013-1375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK &amp; Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1375/">CVE-2013-1375</cve>
	<bugzilla href="https://bugzilla.suse.com/808973">SUSE bug 808973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1378" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1378" ref_url="https://www.suse.com/security/cve/CVE-2013-1378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0670-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK &amp; Compiler before 3.7.0.1530 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1380.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1378/">CVE-2013-1378</cve>
	<bugzilla href="https://bugzilla.suse.com/814635">SUSE bug 814635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1379" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1379" ref_url="https://www.suse.com/security/cve/CVE-2013-1379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0670-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK &amp; Compiler before 3.7.0.1530 do not properly initialize pointer arrays, which allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1379/">CVE-2013-1379</cve>
	<bugzilla href="https://bugzilla.suse.com/814635">SUSE bug 814635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1380" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1380" ref_url="https://www.suse.com/security/cve/CVE-2013-1380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0670-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK &amp; Compiler before 3.7.0.1530 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1378.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1380/">CVE-2013-1380</cve>
	<bugzilla href="https://bugzilla.suse.com/814635">SUSE bug 814635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0523-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html" source="SUSE-SU"/>
    <description>
    The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<bugzilla href="https://bugzilla.suse.com/806715">SUSE bug 806715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1416" ref_url="https://www.suse.com/security/cve/CVE-2013-1416" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0746-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0904-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0967-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html" source="SUSE-SU"/>
    <description>
    The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1416/">CVE-2013-1416</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816413">SUSE bug 816413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00026.html" source="SUSE-SU"/>
    <description>
    do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417</cve>
	<bugzilla href="https://bugzilla.suse.com/850660">SUSE bug 850660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879587">SUSE bug 879587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1751-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00026.html" source="SUSE-SU"/>
    <description>
    The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866059">SUSE bug 866059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879587">SUSE bug 879587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1430" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005721.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430</cve>
	<bugzilla href="https://bugzilla.suse.com/1015567">SUSE bug 1015567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/442182">SUSE bug 442182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521959" comment="xrdp-0.9.0~git.1456906198.f422461-21.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1431" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1431" ref_url="https://www.suse.com/security/cve/CVE-2013-1431" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00143.html" source="SUSE-SU"/>
    <description>
    The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote attackers to bypass TLS verification and perform a man-in-the-middle attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1431/">CVE-2013-1431</cve>
	<bugzilla href="https://bugzilla.suse.com/822586">SUSE bug 822586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141814" comment="telepathy-gabble-0.18.1-3.268 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142152" comment="telepathy-gabble-0.18.3-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "IIOP type reuse management" in ObjectStreamClass.java.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via "certain value handler constructors."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" that can trigger an integer overflow and memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1484" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804654">SUSE bug 804654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1488" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00078.html" source="SUSE-SU"/>
    <description>
    The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807487">SUSE bug 807487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809386">SUSE bug 809386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1518" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<bugzilla href="https://bugzilla.suse.com/824397">SUSE bug 824397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620</cve>
	<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code via vectors involving an onresize event during the playing of a video.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SelectionIterator::GetNextSegment function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The gfxSkipCharsIterator::SetOffsets function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The _cairo_xlib_surface_add_glyph function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::plugins::child::_geturlnotify function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::RemoveScriptBlocker function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1683" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683</cve>
	<bugzilla href="https://bugzilla.suse.com/1150035">SUSE bug 1150035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1688" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    The Profiler implementation in Mozilla Firefox before 22.0 parses untrusted data during UI rendering, which allows user-assisted remote attackers to execute arbitrary JavaScript code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1695" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1696" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1698" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1699" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .com, .name, and .net top-level domains, which allows remote attackers to spoof the address bar via unspecified homograph characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1704" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1708" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging access to an unprivileged object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1719" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the JS_GetGlobalForScopeChain function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain restoration.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1539-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<bugzilla href="https://bugzilla.suse.com/842979">SUSE bug 842979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740</cve>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514863" comment="libpython2_7-1_0-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514864" comment="libpython2_7-1_0-32bit-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514865" comment="python-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514866" comment="python-base-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514867" comment="python-curses-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514868" comment="python-devel-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514869" comment="python-tk-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514870" comment="python-xml-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
    <description>
    The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514863" comment="libpython2_7-1_0-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514864" comment="libpython2_7-1_0-32bit-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514865" comment="python-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514866" comment="python-base-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514867" comment="python-curses-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514868" comment="python-devel-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514869" comment="python-tk-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514870" comment="python-xml-2.7.9-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00074.html" source="SUSE-SU"/>
    <description>
    sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815325">SUSE bug 815325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845568">SUSE bug 845568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141810" comment="sudo-1.8.10p3-1.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00074.html" source="SUSE-SU"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141810" comment="sudo-1.8.10p3-1.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1799" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799" source="SUSE CVE"/>
    <description>
    Gnome Online Accounts (GOA) 3.6.x before 3.6.3 and 3.7.x before 3.7.91, does not properly validate SSL certificates when creating accounts for providers who use the libsoup library, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.  NOTE: this issue exists because of an incomplete fix for CVE-2013-0240.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799</cve>
	<bugzilla href="https://bugzilla.suse.com/808534">SUSE bug 808534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141400" comment="gnome-online-accounts-3.10.5-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141401" comment="gnome-online-accounts-lang-3.10.5-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141402" comment="libgoa-1_0-0-3.10.5-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141403" comment="libgoa-backend-1_0-1-3.10.5-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141404" comment="typelib-1_0-Goa-1_0-3.10.5-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142108" comment="gnome-online-accounts-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142109" comment="gnome-online-accounts-lang-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140636" comment="libgoa-1_0-0-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142110" comment="libgoa-1_0-0-32bit-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140637" comment="libgoa-backend-1_0-1-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142111" comment="typelib-1_0-Goa-1_0-3.20.4-7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159641" comment="gnome-online-accounts-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159642" comment="gnome-online-accounts-lang-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159138" comment="libgoa-1_0-0-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159643" comment="libgoa-1_0-0-32bit-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159139" comment="libgoa-backend-1_0-1-3.20.5-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159644" comment="typelib-1_0-Goa-1_0-3.20.5-9.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863" source="SUSE CVE"/>
    <description>
    Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<bugzilla href="https://bugzilla.suse.com/809624">SUSE bug 809624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1786-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00114.html" source="SUSE-SU"/>
    <description>
    GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140597" comment="gdk-pixbuf-loader-rsvg-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140598" comment="librsvg-2-2-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140599" comment="librsvg-2-2-32bit-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140600" comment="rsvg-view-2.40.15-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141358" comment="gdk-pixbuf-loader-rsvg-2.40.2-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141359" comment="librsvg-2-2-2.40.2-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141360" comment="librsvg-2-2-32bit-2.40.2-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141361" comment="rsvg-view-2.40.2-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009175785" comment="gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175787" comment="librsvg-2-2-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175788" comment="librsvg-2-2-32bit-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175789" comment="rsvg-view-2.40.20-5.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<bugzilla href="https://bugzilla.suse.com/814059">SUSE bug 814059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934753">SUSE bug 934753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934768">SUSE bug 934768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1926" ref_url="https://www.suse.com/security/cve/CVE-2013-1926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0715-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" source="SUSE-SU"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1926/">CVE-2013-1926</cve>
	<bugzilla href="https://bugzilla.suse.com/815596">SUSE bug 815596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818768">SUSE bug 818768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1927" ref_url="https://www.suse.com/security/cve/CVE-2013-1927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0715-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" source="SUSE-SU"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 allows remote attackers to execute arbitrary code via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1927/">CVE-2013-1927</cve>
	<bugzilla href="https://bugzilla.suse.com/815596">SUSE bug 815596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818768">SUSE bug 818768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0776-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00073.html" source="SUSE-SU"/>
    <description>
    X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<bugzilla href="https://bugzilla.suse.com/814653">SUSE bug 814653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815870">SUSE bug 815870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141837" comment="xorg-x11-server-7.6_1.15.2-12.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141838" comment="xorg-x11-server-extra-7.6_1.15.2-12.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0879-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1945" ref_url="https://www.suse.com/security/cve/CVE-2013-1945" source="SUSE CVE"/>
    <description>
    ruby193 uses an insecure LD_LIBRARY_PATH setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1945/">CVE-2013-1945</cve>
	<bugzilla href="https://bugzilla.suse.com/1160788">SUSE bug 1160788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334192" comment="ruby2.1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-2" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0922-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-2" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0922-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818117">SUSE bug 818117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The remoteDispatchStoragePoolListAllVolumes function in the storage pool manager in libvirt 1.0.5 allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of requests "to list all volumes for the particular pool."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<bugzilla href="https://bugzilla.suse.com/820397">SUSE bug 820397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1969" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0729-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0945-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969</cve>
	<bugzilla href="https://bugzilla.suse.com/815665">SUSE bug 815665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1306-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1411-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00009.html" source="SUSE-SU"/>
    <description>
    The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141565" comment="libmysqlclient18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141566" comment="libmysqlclient18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141567" comment="libmysqlclient_r18-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141568" comment="libmysqlclient_r18-32bit-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141569" comment="mariadb-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141570" comment="mariadb-client-10.0.11-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141571" comment="mariadb-errormessages-10.0.11-6.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-12-25"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136381" comment="libX11-6-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136382" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136383" comment="libX11-data-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136384" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136385" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512231" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512232" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512233" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512234" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512235" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1099-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1009-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140748" comment="libXext6-1.3.2-3.61 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140749" comment="libXext6-32bit-1.3.2-3.61 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512238" comment="libXext6-1.3.2-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512239" comment="libXext6-32bit-1.3.2-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1097-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000916.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1014-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140750" comment="libXfixes3-5.0.1-3.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140751" comment="libXfixes3-32bit-5.0.1-3.53 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136640" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136641" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141438" comment="libXi6-1.7.2-3.62 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141439" comment="libXi6-32bit-1.7.2-3.62 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrandr 1.4.0 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141440" comment="libXrandr2-1.4.2-3.56 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141441" comment="libXrandr2-32bit-1.4.2-3.56 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1095-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135553" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135554" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140761" comment="libXrender1-0.9.8-3.56 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140762" comment="libXrender1-32bit-0.9.8-3.56 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140767" comment="libXv1-1.0.10-3.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140768" comment="libXv1-32bit-1.0.10-3.57 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135556" comment="libXvMC1-1.0.8-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140769" comment="libXvMC1-1.0.8-3.57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00158.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136640" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136641" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141438" comment="libXi6-1.7.2-3.62 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141439" comment="libXi6-32bit-1.7.2-3.62 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002689.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824294">SUSE bug 824294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136381" comment="libX11-6-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136382" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136383" comment="libX11-data-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136384" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136385" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512231" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512232" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512233" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512234" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512235" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136640" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136641" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141438" comment="libXi6-1.7.2-3.62 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141439" comment="libXi6-32bit-1.7.2-3.62 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135556" comment="libXvMC1-1.0.8-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140769" comment="libXvMC1-1.0.8-3.57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00158.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1101-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00159.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140746" comment="libXcursor1-1.1.14-3.60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140747" comment="libXcursor1-32bit-1.1.14-3.60 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512236" comment="libXcursor1-1.1.14-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512237" comment="libXcursor1-32bit-1.1.14-4.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136381" comment="libX11-6-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136382" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136383" comment="libX11-data-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136384" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136385" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512231" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512232" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512233" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512234" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512235" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1101-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" source="SUSE-SU"/>
    <description>
    X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<bugzilla href="https://bugzilla.suse.com/818181">SUSE bug 818181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818182">SUSE bug 818182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818183">SUSE bug 818183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1102-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1046-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140765" comment="libXtst6-1.2.2-3.60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140766" comment="libXtst6-32bit-1.2.2-3.60 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141007" comment="libxcb-dri2-0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141008" comment="libxcb-dri2-0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141009" comment="libxcb-dri3-0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141010" comment="libxcb-dri3-0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141011" comment="libxcb-glx0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141012" comment="libxcb-glx0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141013" comment="libxcb-present0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141014" comment="libxcb-present0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141015" comment="libxcb-randr0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141016" comment="libxcb-render0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141017" comment="libxcb-render0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141018" comment="libxcb-shape0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141019" comment="libxcb-shm0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141020" comment="libxcb-shm0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141021" comment="libxcb-sync1-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141022" comment="libxcb-sync1-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141023" comment="libxcb-xf86dri0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141024" comment="libxcb-xfixes0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141025" comment="libxcb-xfixes0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141026" comment="libxcb-xinerama0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141027" comment="libxcb-xkb1-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141028" comment="libxcb-xkb1-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141029" comment="libxcb-xv0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141030" comment="libxcb1-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141031" comment="libxcb1-32bit-1.10-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141728" comment="libxcb-dri2-0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141729" comment="libxcb-dri2-0-32bit-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141730" comment="libxcb-glx0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141731" comment="libxcb-glx0-32bit-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141732" comment="libxcb-randr0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141733" comment="libxcb-render0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141734" comment="libxcb-render0-32bit-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141735" comment="libxcb-shape0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141736" comment="libxcb-shm0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141737" comment="libxcb-shm0-32bit-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141738" comment="libxcb-sync1-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141739" comment="libxcb-xf86dri0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141740" comment="libxcb-xfixes0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141741" comment="libxcb-xfixes0-32bit-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141742" comment="libxcb-xkb1-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141743" comment="libxcb-xkb1-32bit-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141744" comment="libxcb-xv0-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141745" comment="libxcb1-1.10-1.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141746" comment="libxcb1-32bit-1.10-1.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512536" comment="libxcb-dri2-0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512537" comment="libxcb-dri2-0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512538" comment="libxcb-dri3-0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512539" comment="libxcb-dri3-0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512540" comment="libxcb-glx0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512541" comment="libxcb-glx0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512542" comment="libxcb-present0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512543" comment="libxcb-present0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512544" comment="libxcb-randr0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512545" comment="libxcb-render0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512546" comment="libxcb-render0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512547" comment="libxcb-shape0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512548" comment="libxcb-shm0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512549" comment="libxcb-shm0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512550" comment="libxcb-sync1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512551" comment="libxcb-sync1-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512552" comment="libxcb-xf86dri0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512553" comment="libxcb-xfixes0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512554" comment="libxcb-xfixes0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512555" comment="libxcb-xinerama0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512556" comment="libxcb-xkb1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512557" comment="libxcb-xkb1-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512558" comment="libxcb-xv0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512559" comment="libxcb1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512560" comment="libxcb1-32bit-1.10-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140767" comment="libXv1-1.0.10-3.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140768" comment="libXv1-32bit-1.0.10-3.57 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.0.x, 4.1.x, and 4.2.x, when running on AMD64 processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one domain to determine portions of the state of floating point instructions of other domains, which can be leveraged to obtain sensitive information such as cryptographic keys, a similar vulnerability to CVE-2006-1056.  NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.0.x, 4.1.x, and 4.2.x does not properly restrict the contents of a XRSTOR, which allows local PV guest users to cause a denial of service (unhandled exception and hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2126" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1083-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1085-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1168-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00032.html" source="SUSE-SU"/>
    <description>
    Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126</cve>
	<bugzilla href="https://bugzilla.suse.com/822665">SUSE bug 822665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823113">SUSE bug 823113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823114">SUSE bug 823114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141629" comment="libraw9-0.15.4-3.88 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2127" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127" source="SUSE CVE"/>
    <description>
    Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127</cve>
	<bugzilla href="https://bugzilla.suse.com/822665">SUSE bug 822665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141629" comment="libraw9-0.15.4-3.88 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2131" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002549.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1646-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0474-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00060.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the rrdtool module 1.4.7 for Python, as used in Zenoss, allows context-dependent attackers to cause a denial of service (crash) via format string specifiers to the rrdtool.graph function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131</cve>
	<bugzilla href="https://bugzilla.suse.com/828003">SUSE bug 828003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009146857" comment="rrdtool-1.4.7-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009146858" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517178" comment="rrdtool-1.4.7-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517179" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2139" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1258-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00059.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in srtp.c in libsrtp in srtp 1.4.5 and earlier allows remote attackers to cause a denial of service (crash) via vectors related to a length inconsistency in the crypto_policy_set_from_profile_for_rtp and srtp_protect functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139</cve>
	<bugzilla href="https://bugzilla.suse.com/828009">SUSE bug 828009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140951" comment="libsrtp1-1.5.2-2.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512483" comment="libsrtp1-1.5.2-3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2142" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142" source="SUSE CVE"/>
    <description>
    userpref.c in libimobiledevice 1.1.4, when $HOME and $XDG_CONFIG_HOME are not set, allows local users to overwrite arbitrary files via a symlink attack on (1) HostCertificate.pem, (2) HostPrivateKey.pem, (3) libimobiledevicerc, (4) RootCertificate.pem, or (5) RootPrivateKey.pem in /tmp/root/.config/libimobiledevice/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142</cve>
	<bugzilla href="https://bugzilla.suse.com/823250">SUSE bug 823250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142127" comment="imobiledevice-tools-1.2.0-7.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1118-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The _dbus_printf_string_upper_bound function in dbus/dbus-sysdeps-unix.c in D-Bus (aka DBus) 1.4.x before 1.4.26, 1.6.x before 1.6.12, and 1.7.x before 1.7.4 allows local users to cause a denial of service (service crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168</cve>
	<bugzilla href="https://bugzilla.suse.com/824607">SUSE bug 824607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1166-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<bugzilla href="https://bugzilla.suse.com/824517">SUSE bug 824517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917692">SUSE bug 917692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2189" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2189" ref_url="https://www.suse.com/security/cve/CVE-2013-2189" source="SUSE CVE"/>
    <description>
    Apache OpenOffice.org (OOo) before 4.0 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via invalid PLCF data in a DOC document file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2189/">CVE-2013-2189</cve>
	<bugzilla href="https://bugzilla.suse.com/831904">SUSE bug 831904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333957" comment="libreoffice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "pointer dereferences" involving unexpected calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "other problems" that are not CVE-2013-2194 or CVE-2013-2195.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
    <description>
    The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211</cve>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2218" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218</cve>
	<bugzilla href="https://bugzilla.suse.com/827741">SUSE bug 827741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2230" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230" source="SUSE CVE"/>
    <description>
    The qemu driver (qemu/qemu_driver.c) in libvirt before 1.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via unspecified vectors involving "multiple events registration."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230</cve>
	<bugzilla href="https://bugzilla.suse.com/827801">SUSE bug 827801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234</cve>
	<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0625-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<bugzilla href="https://bugzilla.suse.com/811876">SUSE bug 811876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "handling of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2415" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows local users to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "processing of MTOM attachments" and the creation of temporary files with weak permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font processing errors" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2421" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect MethodHandle lookups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2423" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient class access checks" when "creating new instances" using MBeanInstantiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2426" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect invocation of the defaultReadObject method in the ConcurrentHashMap class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageWriter state corruption" when using native code, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageReader state corruption" when using native code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2431" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to bypassing the Java sandbox using "method handle intrinsic frames."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2436" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-1488 and CVE-2013-2426.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "type checks" and "method handle binding" involving Wrapper.convert.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect "checking order" within the AccessControlContext class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not "properly manage and restrict certain resources related to the processing of fonts," possibly involving temporary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Hotspot.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "handling of memory allocation errors."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket's local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient "access restrictions" and "robustness of sound classes."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2449" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to GnomeFileTypeDetector and a missing check for read permissions for a path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "network address handling in virtual machine identifiers" and the lack of "unique and unpredictable IDs" in the java.rmi.dgc.VMID class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for "package access" by the MBeanServer Introspector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via "an error related to method handles."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "integer overflow checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier; the Oracle JRockit component in Oracle Fusion Middleware R27.7.5 and earlier and R28.2.7 and earlier; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June and July 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass verification of XML signatures via vectors related to a "Missing check for [a] valid DOMCanonicalizationMethod canonicalization algorithm."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "ImagingLib byte lookup processing."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0911-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0947-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" source="SUSE-SU"/>
    <description>
    The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0911-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0947-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2492" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2492" ref_url="https://www.suse.com/security/cve/CVE-2013-2492" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2492/">CVE-2013-2492</cve>
	<bugzilla href="https://bugzilla.suse.com/808268">SUSE bug 808268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141509" comment="libfbembed2_5-2.5.2.26539-13.42 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154924" comment="libfbembed2_5-2.5.2.26539-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2548" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2548" ref_url="https://www.suse.com/security/cve/CVE-2013-2548" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect length value during a copy operation, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2548/">CVE-2013-2548</cve>
	<bugzilla href="https://bugzilla.suse.com/809906">SUSE bug 809906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2555" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2555" ref_url="https://www.suse.com/security/cve/CVE-2013-2555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0670-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK &amp; Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2555/">CVE-2013-2555</cve>
	<bugzilla href="https://bugzilla.suse.com/814635">SUSE bug 814635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2728" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2728" ref_url="https://www.suse.com/security/cve/CVE-2013-2728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2728/">CVE-2013-2728</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<bugzilla href="https://bugzilla.suse.com/821560">SUSE bug 821560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2888" ref_url="https://www.suse.com/security/cve/CVE-2013-2888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2888/">CVE-2013-2888</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2889" ref_url="https://www.suse.com/security/cve/CVE-2013-2889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2889/">CVE-2013-2889</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2890" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2890" ref_url="https://www.suse.com/security/cve/CVE-2013-2890" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2890/">CVE-2013-2890</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2891" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2891" ref_url="https://www.suse.com/security/cve/CVE-2013-2891" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-steelseries.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_STEELSERIES is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2891/">CVE-2013-2891</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2892" ref_url="https://www.suse.com/security/cve/CVE-2013-2892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2892/">CVE-2013-2892</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2894" ref_url="https://www.suse.com/security/cve/CVE-2013-2894" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2894/">CVE-2013-2894</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2895" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2895" ref_url="https://www.suse.com/security/cve/CVE-2013-2895" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-logitech-dj.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LOGITECH_DJ is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or obtain sensitive information from kernel memory via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2895/">CVE-2013-2895</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2896" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2896" ref_url="https://www.suse.com/security/cve/CVE-2013-2896" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2896/">CVE-2013-2896</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2898" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2898" ref_url="https://www.suse.com/security/cve/CVE-2013-2898" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2898/">CVE-2013-2898</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2899" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2944" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1237-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1237-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000564.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0774-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0775-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0873-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0985-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00121.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141806" comment="strongswan-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141807" comment="strongswan-doc-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141808" comment="strongswan-ipsec-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141809" comment="strongswan-libs0-5.1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3324" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3324" ref_url="https://www.suse.com/security/cve/CVE-2013-3324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3324/">CVE-2013-3324</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3325" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3325" ref_url="https://www.suse.com/security/cve/CVE-2013-3325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3325/">CVE-2013-3325</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3326" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3326" ref_url="https://www.suse.com/security/cve/CVE-2013-3326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3326/">CVE-2013-3326</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3327" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3327" ref_url="https://www.suse.com/security/cve/CVE-2013-3327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3327/">CVE-2013-3327</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3328" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3328" ref_url="https://www.suse.com/security/cve/CVE-2013-3328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3328/">CVE-2013-3328</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3329" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3329" ref_url="https://www.suse.com/security/cve/CVE-2013-3329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3329/">CVE-2013-3329</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3330" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3330" ref_url="https://www.suse.com/security/cve/CVE-2013-3330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3330/">CVE-2013-3330</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3331" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3331" ref_url="https://www.suse.com/security/cve/CVE-2013-3331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3331/">CVE-2013-3331</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3332" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3332" ref_url="https://www.suse.com/security/cve/CVE-2013-3332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3332/">CVE-2013-3332</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3333" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3333" ref_url="https://www.suse.com/security/cve/CVE-2013-3333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3333/">CVE-2013-3333</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3334" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3334" ref_url="https://www.suse.com/security/cve/CVE-2013-3334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3334/">CVE-2013-3334</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3335" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3335" ref_url="https://www.suse.com/security/cve/CVE-2013-3335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, and CVE-2013-3334.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3335/">CVE-2013-3335</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3343" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3343" ref_url="https://www.suse.com/security/cve/CVE-2013-3343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1040-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1063-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00179.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.90 and 11.x before 11.7.700.224 on Windows, before 10.3.183.90 and 11.x before 11.7.700.225 on Mac OS X, before 10.3.183.90 and 11.x before 11.2.202.291 on Linux, before 11.1.111.59 on Android 2.x and 3.x, and before 11.1.115.63 on Android 4.x; Adobe AIR before 3.7.0.2090 on Windows and Android and before 3.7.0.2100 on Mac OS X; and Adobe AIR SDK &amp; Compiler before 3.7.0.2090 on Windows and before 3.7.0.2100 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3343/">CVE-2013-3343</cve>
	<bugzilla href="https://bugzilla.suse.com/824512">SUSE bug 824512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3344" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3344" ref_url="https://www.suse.com/security/cve/CVE-2013-3344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3344/">CVE-2013-3344</cve>
	<bugzilla href="https://bugzilla.suse.com/828810">SUSE bug 828810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3345" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3345" ref_url="https://www.suse.com/security/cve/CVE-2013-3345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3345/">CVE-2013-3345</cve>
	<bugzilla href="https://bugzilla.suse.com/828810">SUSE bug 828810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3347" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3347" ref_url="https://www.suse.com/security/cve/CVE-2013-3347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code via PCM data that is not properly handled during resampling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3347/">CVE-2013-3347</cve>
	<bugzilla href="https://bugzilla.suse.com/828810">SUSE bug 828810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3361" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3361" ref_url="https://www.suse.com/security/cve/CVE-2013-3361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1459-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK &amp; Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3362, CVE-2013-3363, and CVE-2013-5324.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3361/">CVE-2013-3361</cve>
	<bugzilla href="https://bugzilla.suse.com/839897">SUSE bug 839897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3362" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3362" ref_url="https://www.suse.com/security/cve/CVE-2013-3362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1459-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK &amp; Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3363, and CVE-2013-5324.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3362/">CVE-2013-3362</cve>
	<bugzilla href="https://bugzilla.suse.com/839897">SUSE bug 839897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3363" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3363" ref_url="https://www.suse.com/security/cve/CVE-2013-3363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1459-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK &amp; Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-5324.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3363/">CVE-2013-3363</cve>
	<bugzilla href="https://bugzilla.suse.com/839897">SUSE bug 839897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<bugzilla href="https://bugzilla.suse.com/826717">SUSE bug 826717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html" source="SUSE-SU"/>
    <description>
    Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567</cve>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825878">SUSE bug 825878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
    <description>
    socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141804" comment="socat-1.7.2.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3718" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3718" ref_url="https://www.suse.com/security/cve/CVE-2013-3718" source="SUSE CVE"/>
    <description>
    evince is missing a check on number of pages which can lead to a segmentation fault
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3718/">CVE-2013-3718</cve>
	<bugzilla href="https://bugzilla.suse.com/970030">SUSE bug 970030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334136" comment="evince is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4118" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4118" ref_url="https://www.suse.com/security/cve/CVE-2013-4118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002324.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2402-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html" source="SUSE-SU"/>
    <description>
    FreeRDP before 1.1.0-beta1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4118/">CVE-2013-4118</cve>
	<bugzilla href="https://bugzilla.suse.com/829013">SUSE bug 829013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516528" comment="freerdp-1.0.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516529" comment="libfreerdp-1_0-1.0.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516530" comment="libfreerdp-1_0-plugins-1.0.2-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1349-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<bugzilla href="https://bugzilla.suse.com/829969">SUSE bug 829969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143" source="SUSE CVE"/>
    <description>
    The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143</cve>
	<bugzilla href="https://bugzilla.suse.com/829859">SUSE bug 829859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4148" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148" source="SUSE CVE"/>
    <description>
    Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<bugzilla href="https://bugzilla.suse.com/864812">SUSE bug 864812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964630">SUSE bug 964630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4149" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149" source="SUSE CVE"/>
    <description>
    Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<bugzilla href="https://bugzilla.suse.com/864649">SUSE bug 864649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964443">SUSE bug 964443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4150" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150" source="SUSE CVE"/>
    <description>
    The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<bugzilla href="https://bugzilla.suse.com/864650">SUSE bug 864650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4151" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151" source="SUSE CVE"/>
    <description>
    The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<bugzilla href="https://bugzilla.suse.com/864653">SUSE bug 864653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964636">SUSE bug 964636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4153" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the qemuAgentGetVCPUs function in qemu/qemu_agent.c in libvirt 1.0.6 through 1.1.0 allows remote attackers to cause a denial of service (daemon crash) via a cpu count request, as demonstrated by the "virsh vcpucount dom --guest" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153</cve>
	<bugzilla href="https://bugzilla.suse.com/830497">SUSE bug 830497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830498">SUSE bug 830498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4154" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154" source="SUSE CVE"/>
    <description>
    The qemuAgentCommand function in libvirt before 1.1.1, when a guest agent is not configured, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to "agent based cpu (un)plug," as demonstrated by the "virsh vcpucount foobar --guest" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154</cve>
	<bugzilla href="https://bugzilla.suse.com/830498">SUSE bug 830498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4233" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00010.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<bugzilla href="https://bugzilla.suse.com/1022032">SUSE bug 1022032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834483">SUSE bug 834483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177725" comment="libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521020" comment="libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4234" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00010.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<bugzilla href="https://bugzilla.suse.com/1022032">SUSE bug 1022032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834483">SUSE bug 834483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177725" comment="libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521020" comment="libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883022">SUSE bug 883022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1437-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1438-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1440-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1462-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1463-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130998" comment="python-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131000" comment="python-curses-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131002" comment="python-tk-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141074" comment="python3-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141075" comment="python3-curses-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141605" comment="libpython2_7-1_0-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141606" comment="libpython2_7-1_0-32bit-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141777" comment="python-2.7.7-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141607" comment="python-base-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141778" comment="python-curses-2.7.7-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141608" comment="python-devel-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141779" comment="python-tk-2.7.7-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141609" comment="python-xml-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141780" comment="python3-3.4.1-2.76 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142044" comment="python-2.7.9-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142045" comment="python-curses-2.7.9-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142046" comment="python-tk-2.7.9-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141074" comment="python3-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159263" comment="python-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159265" comment="python-curses-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159269" comment="python-tk-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159274" comment="python3-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159275" comment="python3-curses-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512601" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512602" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4239" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239" source="SUSE CVE"/>
    <description>
    The xenDaemonListDefinedDomains function in xen/xend_internal.c in libvirt 1.1.1 allows remote authenticated users to cause a denial of service (memory corruption and crash) via vectors involving the virConnectListDefinedDomains API function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239</cve>
	<bugzilla href="https://bugzilla.suse.com/834598">SUSE bug 834598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000829.html" source="SUSE-SU"/>
    <description>
    GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114243" comment="libgcrypt20-1.6.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114244" comment="libgcrypt20-32bit-1.6.1-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141522" comment="libgcrypt20-1.6.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141523" comment="libgcrypt20-32bit-1.6.1-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156955" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156956" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512320" comment="libgcrypt20-1.6.1-16.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512321" comment="libgcrypt20-32bit-1.6.1-16.61.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4245" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
    <description>
    Orca has arbitrary code execution due to insecure Python module load
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334343" comment="orca is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1547-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141435" comment="lcms-1.19-17.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0884-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1750-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<bugzilla href="https://bugzilla.suse.com/848279">SUSE bug 848279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142017" comment="libspice-server1-0.12.5-2.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514692" comment="libspice-server1-0.12.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333998" comment="spice is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1617-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html" source="SUSE-SU"/>
    <description>
    Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836939">SUSE bug 836939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844967">SUSE bug 844967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854144">SUSE bug 854144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140954" comment="libsystemd0-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140955" comment="libsystemd0-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140956" comment="libudev1-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140957" comment="libudev1-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140958" comment="systemd-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140959" comment="systemd-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140960" comment="systemd-bash-completion-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140961" comment="systemd-sysvinit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140962" comment="udev-228-117.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159206" comment="libsystemd0-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159207" comment="libsystemd0-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159208" comment="libudev1-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159209" comment="libudev1-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159210" comment="systemd-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159211" comment="systemd-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159212" comment="systemd-bash-completion-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159213" comment="systemd-sysvinit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159214" comment="udev-228-142.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141527" comment="libgudev-1_0-0-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141528" comment="libgudev-1_0-0-32bit-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141587" comment="libpolkit0-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141588" comment="libpolkit0-32bit-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141529" comment="libudev1-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141530" comment="libudev1-32bit-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141589" comment="polkit-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141531" comment="systemd-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141532" comment="systemd-32bit-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141533" comment="systemd-bash-completion-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141534" comment="systemd-sysvinit-210-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141590" comment="typelib-1_0-Polkit-1_0-0.112-2.189 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141535" comment="udev-210-44.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141971" comment="libgudev-1_0-0-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141972" comment="libgudev-1_0-0-32bit-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115371" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115372" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141973" comment="libudev1-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141974" comment="libudev1-32bit-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115373" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141975" comment="systemd-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141976" comment="systemd-32bit-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141977" comment="systemd-bash-completion-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141978" comment="systemd-sysvinit-210-83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115376" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141979" comment="udev-210-83.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4292" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4292" ref_url="https://www.suse.com/security/cve/CVE-2013-4292" source="SUSE CVE"/>
    <description>
    libvirt 1.1.0 and 1.1.1 allows local users to cause a denial of service (memory consumption) via a large number of domain migrate parameters in certain RPC calls in (1) daemon/remote.c and (2) remote/remote_driver.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4292/">CVE-2013-4292</cve>
	<bugzilla href="https://bugzilla.suse.com/837531">SUSE bug 837531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1550-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4297" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297" source="SUSE CVE"/>
    <description>
    The virFileNBDDeviceAssociate function in util/virfile.c in libvirt 1.1.2 and earlier allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297</cve>
	<bugzilla href="https://bugzilla.suse.com/838642">SUSE bug 838642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1550-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" source="SUSE-SU"/>
    <description>
    libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968014">SUSE bug 968014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4314" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1648-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0477-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314</cve>
	<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141084" comment="python-pyOpenSSL-16.0.0-2.3.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141789" comment="python-pyOpenSSL-0.14-1.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512598" comment="python-pyOpenSSL-16.0.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512599" comment="python3-pyOpenSSL-16.0.0-4.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0188-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1617-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html" source="SUSE-SU"/>
    <description>
    The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4326" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1597-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00051.html" source="SUSE-SU"/>
    <description>
    RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836939">SUSE bug 836939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
    <description>
    The xenlight library (libxl) in Xen 4.0.x through 4.2.x, when IOMMU is disabled, provides access to a busmastering-capable PCI passthrough device before the IOMMU setup is complete, which allows local HVM guest domains to gain privileges or cause a denial of service via a DMA instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329</cve>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00034.html" source="SUSE-SU"/>
    <description>
    xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882917">SUSE bug 882917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512634" comment="xinetd-2.3.15-8.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4349" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1511-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-4540.  Reason: This candidate was MERGED into CVE-2012-4540, since it was later discovered that it affected an additional version, but it does not constitute a regression error.  Notes: All CVE users should reference CVE-2012-4540 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<bugzilla href="https://bugzilla.suse.com/840572">SUSE bug 840572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1532-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html" source="SUSE-SU"/>
    <description>
    GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141412" comment="gpg2-2.0.24-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141413" comment="gpg2-lang-2.0.24-1.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159008" comment="gpg2-2.0.24-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159009" comment="gpg2-lang-2.0.24-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512180" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512181" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353" source="SUSE CVE"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021448" ref_url="https://www.suse.com/support/kb/doc/?id=7021448" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="TID7021992" ref_url="https://www.suse.com/support/kb/doc/?id=7021992" source="SUSE-SU"/>
		<reference ref_id="TID7022038" ref_url="https://www.suse.com/support/kb/doc/?id=7022038" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0094-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0096-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html" source="SUSE-SU"/>
    <description>
    The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<bugzilla href="https://bugzilla.suse.com/857640">SUSE bug 857640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4356" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356" source="SUSE CVE"/>
    <description>
    Xen 4.3.x writes hypervisor mappings to certain shadow pagetables when live migration is performed on hosts with more than 5TB of RAM, which allows local 64-bit PV guests to read or write to invalid memory and cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356</cve>
	<bugzilla href="https://bugzilla.suse.com/840593">SUSE bug 840593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4387" ref_url="https://www.suse.com/security/cve/CVE-2013-4387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
    <description>
    net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4387/">CVE-2013-4387</cve>
	<bugzilla href="https://bugzilla.suse.com/843430">SUSE bug 843430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848042">SUSE bug 848042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1610-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1614-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<bugzilla href="https://bugzilla.suse.com/843652">SUSE bug 843652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141837" comment="xorg-x11-server-7.6_1.15.2-12.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141838" comment="xorg-x11-server-extra-7.6_1.15.2-12.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4399" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399" source="SUSE CVE"/>
    <description>
    The remoteClientFreeFunc function in daemon/remote.c in libvirt before 1.1.3, when ACLs are used, does not set an identity, which causes event handler removal to be denied and remote attackers to cause a denial of service (use-after-free and crash) by registering an event handler and then closing the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399</cve>
	<bugzilla href="https://bugzilla.suse.com/842300">SUSE bug 842300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844052">SUSE bug 844052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4400" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400" source="SUSE CVE"/>
    <description>
    virt-login-shell in libvirt 1.1.2 through 1.1.3 allows local users to overwrite arbitrary files and possibly gain privileges via unspecified environment variables or command-line arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400</cve>
	<bugzilla href="https://bugzilla.suse.com/837609">SUSE bug 837609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4401" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401" source="SUSE CVE"/>
    <description>
    The virConnectDomainXMLToNative API function in libvirt 1.1.0 through 1.1.3 checks for the connect:read permission instead of the connect:write permission, which allows attackers to gain domain:write privileges and execute Qemu binaries via crafted XML.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401</cve>
	<bugzilla href="https://bugzilla.suse.com/845704">SUSE bug 845704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1546-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1552-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00025.html" source="SUSE-SU"/>
    <description>
    The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941439">SUSE bug 941439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141412" comment="gpg2-2.0.24-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141413" comment="gpg2-lang-2.0.24-1.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159008" comment="gpg2-2.0.24-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159009" comment="gpg2-lang-2.0.24-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512180" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512181" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882906">SUSE bug 882906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883217">SUSE bug 883217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955181">SUSE bug 955181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<bugzilla href="https://bugzilla.suse.com/847907">SUSE bug 847907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474" source="SUSE CVE"/>
    <description>
    Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<bugzilla href="https://bugzilla.suse.com/847907">SUSE bug 847907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000886.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1742-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1787-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1790-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
    <description>
    Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1742-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
    <description>
    Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<bugzilla href="https://bugzilla.suse.com/848103">SUSE bug 848103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483</cve>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<bugzilla href="https://bugzilla.suse.com/849224">SUSE bug 849224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866844">SUSE bug 866844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4509" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1825-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0068-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00045.html" source="SUSE-SU"/>
    <description>
    The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<bugzilla href="https://bugzilla.suse.com/847718">SUSE bug 847718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140683" comment="ibus-chewing-1.4.14-4.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140684" comment="ibus-pinyin-1.5.0-7.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140683" comment="ibus-chewing-1.4.14-4.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159032" comment="ibus-pinyin-1.5.0-11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141417" comment="ibus-chewing-1.4.10.1-2.25 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141418" comment="ibus-pinyin-1.5.0-2.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4526" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526" source="SUSE CVE"/>
    <description>
    Buffer overflow in hw/ide/ahci.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to migrating ports.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<bugzilla href="https://bugzilla.suse.com/864671">SUSE bug 864671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964746">SUSE bug 964746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964929">SUSE bug 964929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4530" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964950">SUSE bug 964950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4531" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531" source="SUSE CVE"/>
    <description>
    Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<bugzilla href="https://bugzilla.suse.com/864796">SUSE bug 864796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4535" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535" source="SUSE CVE"/>
    <description>
    The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<bugzilla href="https://bugzilla.suse.com/864665">SUSE bug 864665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964676">SUSE bug 964676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536" source="SUSE CVE"/>
    <description>
    An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<bugzilla href="https://bugzilla.suse.com/864665">SUSE bug 864665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964676">SUSE bug 964676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<bugzilla href="https://bugzilla.suse.com/864802">SUSE bug 864802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4542" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542" source="SUSE CVE"/>
    <description>
    The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<bugzilla href="https://bugzilla.suse.com/864804">SUSE bug 864804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4544" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544" source="SUSE CVE"/>
    <description>
    hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544</cve>
	<bugzilla href="https://bugzilla.suse.com/873613">SUSE bug 873613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1865-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<bugzilla href="https://bugzilla.suse.com/849596">SUSE bug 849596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924250">SUSE bug 924250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000731.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0070-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0125-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00106.html" source="SUSE-SU"/>
    <description>
    QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587</cve>
	<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4591" ref_url="https://www.suse.com/security/cve/CVE-2013-4591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname on an NFSv4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4591/">CVE-2013-4591</cve>
	<bugzilla href="https://bugzilla.suse.com/851103">SUSE bug 851103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4758" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758</cve>
	<bugzilla href="https://bugzilla.suse.com/828140">SUSE bug 828140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141802" comment="rsyslog-8.4.0-2.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142058" comment="rsyslog-8.4.0-8.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159295" comment="rsyslog-8.24.0-1.20 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512617" comment="rsyslog-8.24.0-3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service.  NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836962">SUSE bug 836962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00018.html" source="SUSE-SU"/>
    <description>
    The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<bugzilla href="https://bugzilla.suse.com/831899">SUSE bug 831899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4920" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920" source="SUSE CVE"/>
    <description>
    The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4921" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921" source="SUSE CVE"/>
    <description>
    Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4922" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4923" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923" source="SUSE CVE"/>
    <description>
    Memory leak in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4924" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4925" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925" source="SUSE CVE"/>
    <description>
    Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4926" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4928" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928" source="SUSE CVE"/>
    <description>
    Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4936" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936" source="SUSE CVE"/>
    <description>
    The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4956" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4956" ref_url="https://www.suse.com/security/cve/CVE-2013-4956" source="SUSE CVE"/>
    <description>
    Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally built, which might allow local users to read or modify those modules depending on the original permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4956/">CVE-2013-4956</cve>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835123">SUSE bug 835123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836962">SUSE bug 836962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1866-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1866-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000675.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1332-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1333-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00050.html" source="SUSE-SU"/>
    <description>
    The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141806" comment="strongswan-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141807" comment="strongswan-doc-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141808" comment="strongswan-ipsec-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141809" comment="strongswan-libs0-5.1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5123" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123" source="SUSE CVE"/>
    <description>
    The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-05"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123</cve>
	<bugzilla href="https://bugzilla.suse.com/864406">SUSE bug 864406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561558" comment="python-ply-3.4-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2014:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000934.html" source="SUSE-SU"/>
		<reference ref_id="TID7014543" ref_url="https://www.suse.com/support/kb/doc?id=7014543" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0949-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00031.html" source="SUSE-SU"/>
    <description>
    The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<bugzilla href="https://bugzilla.suse.com/857195">SUSE bug 857195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889447">SUSE bug 889447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141758" comment="ntp-4.2.6p5-24.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141759" comment="ntp-doc-4.2.6p5-24.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5324" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5324" ref_url="https://www.suse.com/security/cve/CVE-2013-5324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1459-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK &amp; Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-3363.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5324/">CVE-2013-5324</cve>
	<bugzilla href="https://bugzilla.suse.com/839897">SUSE bug 839897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5329" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5329" ref_url="https://www.suse.com/security/cve/CVE-2013-5329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.252 and 11.8.x and 11.9.x before 11.9.900.152 on Windows and Mac OS X and before 11.2.202.327 on Linux, Adobe AIR before 3.9.0.1210, Adobe AIR SDK before 3.9.0.1210, and Adobe AIR SDK &amp; Compiler before 3.9.0.1210 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5329/">CVE-2013-5329</cve>
	<bugzilla href="https://bugzilla.suse.com/850220">SUSE bug 850220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5330" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5330" ref_url="https://www.suse.com/security/cve/CVE-2013-5330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.252 and 11.8.x and 11.9.x before 11.9.900.152 on Windows and Mac OS X and before 11.2.202.327 on Linux, Adobe AIR before 3.9.0.1210, Adobe AIR SDK before 3.9.0.1210, and Adobe AIR SDK &amp; Compiler before 3.9.0.1210 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5329.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5330/">CVE-2013-5330</cve>
	<bugzilla href="https://bugzilla.suse.com/850220">SUSE bug 850220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5331" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5331" ref_url="https://www.suse.com/security/cve/CVE-2013-5331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1898-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00084.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK &amp; Compiler before 3.9.0.1380 allow remote attackers to execute arbitrary code via crafted .swf content that leverages an unspecified "type confusion," as exploited in the wild in December 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5331/">CVE-2013-5331</cve>
	<bugzilla href="https://bugzilla.suse.com/854881">SUSE bug 854881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5332" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5332" ref_url="https://www.suse.com/security/cve/CVE-2013-5332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1898-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00084.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK &amp; Compiler before 3.9.0.1380 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5332/">CVE-2013-5332</cve>
	<bugzilla href="https://bugzilla.suse.com/854881">SUSE bug 854881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
    <description>
    PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00084.html" source="SUSE-SU"/>
    <description>
    The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007816">SUSE bug 1007816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516638" comment="ghostscript-9.15-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516639" comment="ghostscript-x11-9.15-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717" source="SUSE CVE"/>
    <description>
    The Bluetooth HCI ACL dissector in Wireshark 1.10.x before 1.10.2 does not properly maintain a certain free list, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that is not properly handled by the wmem_block_alloc function in epan/wmem/wmem_allocator_block.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not restrict the dch_id value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to SCRIPTING.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to BEANS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and JavaFX 2.2.40 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, and JRockit R27.7.6 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5805" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5806.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5806" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5805.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5829.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5809.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5842.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU.  Oracle has not commented on third-party claims that the Security component does not properly handle null XML namespace (xmlns) attributes during XML document canonicalization, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an incorrect check for code permissions by CORBA stub factories.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5893" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45 and Java SE Embedded 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to improper handling of methods in MethodHandles in HotSpot JVM, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that com.sun.corba.se and its sub-packages are not included on the restricted package list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6075" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1646-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1651-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<bugzilla href="https://bugzilla.suse.com/847506">SUSE bug 847506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141806" comment="strongswan-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141807" comment="strongswan-doc-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141808" comment="strongswan-ipsec-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141809" comment="strongswan-libs0-5.1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6076" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076" source="SUSE CVE"/>
    <description>
    strongSwan 5.0.2 through 5.1.0 allows remote attackers to cause a denial of service (NULL pointer dereference and charon daemon crash) via a crafted IKEv1 fragmentation packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076</cve>
	<bugzilla href="https://bugzilla.suse.com/847509">SUSE bug 847509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141806" comment="strongswan-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141807" comment="strongswan-doc-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141808" comment="strongswan-ipsec-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141809" comment="strongswan-libs0-5.1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367</cve>
	<bugzilla href="https://bugzilla.suse.com/853051">SUSE bug 853051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6369" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0978-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00009.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<bugzilla href="https://bugzilla.suse.com/870855">SUSE bug 870855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141560" comment="libjbig2-2.0-12.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6370" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0558-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00059.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<bugzilla href="https://bugzilla.suse.com/870147">SUSE bug 870147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141802" comment="rsyslog-8.4.0-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142058" comment="rsyslog-8.4.0-8.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159295" comment="rsyslog-8.24.0-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512617" comment="rsyslog-8.24.0-3.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6371" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0558-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00059.html" source="SUSE-SU"/>
    <description>
    The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<bugzilla href="https://bugzilla.suse.com/870147">SUSE bug 870147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141802" comment="rsyslog-8.4.0-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142058" comment="rsyslog-8.4.0-8.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159295" comment="rsyslog-8.24.0-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512617" comment="rsyslog-8.24.0-3.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6376" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
    <description>
    The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376</cve>
	<bugzilla href="https://bugzilla.suse.com/853053">SUSE bug 853053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6381" ref_url="https://www.suse.com/security/cve/CVE-2013-6381" source="SUSE CVE"/>
    <description>
    Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6381/">CVE-2013-6381</cve>
	<bugzilla href="https://bugzilla.suse.com/852552">SUSE bug 852552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6393" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0272-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0381-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" source="SUSE-SU"/>
    <description>
    The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<bugzilla href="https://bugzilla.suse.com/860617">SUSE bug 860617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141752" comment="libyaml-0-2-0.1.6-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514734" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6399" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399" source="SUSE CVE"/>
    <description>
    Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<bugzilla href="https://bugzilla.suse.com/864814">SUSE bug 864814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964643">SUSE bug 964643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0188-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0127-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0146-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00098.html" source="SUSE-SU"/>
    <description>
    base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hp-pkservice.log temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6405" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6405" ref_url="https://www.suse.com/security/cve/CVE-2013-6405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, CVE-2013-7281.  Reason: This candidate is a duplicate of CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, and CVE-2013-7281.  Notes: All CVE users should reference CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, and/or CVE-2013-7281 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6405/">CVE-2013-6405</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6418" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000804.html" source="SUSE-SU"/>
    <description>
    PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<bugzilla href="https://bugzilla.suse.com/856323">SUSE bug 856323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0051-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00127.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141837" comment="xorg-x11-server-7.6_1.15.2-12.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141838" comment="xorg-x11-server-extra-7.6_1.15.2-12.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0127-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html" source="SUSE-SU"/>
    <description>
    upgrade.py in the hp-upgrade service in HP Linux Imaging and Printing (HPLIP) 3.x through 3.13.11 launches a program from an http URL, which allows man-in-the-middle attackers to execute arbitrary code by gaining control over the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427</cve>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853405">SUSE bug 853405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900460">SUSE bug 900460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933191">SUSE bug 933191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1716-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00100.html" source="SUSE-SU"/>
    <description>
    Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105405" comment="rpm-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105404" comment="rpm-32bit-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105406" comment="rpm-build-4.11.2-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141108" comment="rpm-4.11.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141109" comment="rpm-32bit-4.11.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141110" comment="rpm-build-4.11.2-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512613" comment="rpm-4.11.2-16.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512614" comment="rpm-32bit-4.11.2-16.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512615" comment="rpm-build-4.11.2-16.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514922" comment="rpm-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514923" comment="rpm-32bit-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514924" comment="rpm-build-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514925" comment="rpm-python-4.11.2-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6436" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000707.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<bugzilla href="https://bugzilla.suse.com/854486">SUSE bug 854486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" source="SUSE-SU"/>
    <description>
    The owner_set function in smbcacls.c in smbcacls in Samba 4.0.x before 4.0.16 and 4.1.x before 4.1.6 removes an ACL during use of a --chown or --chgrp option, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended administrative change.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<bugzilla href="https://bugzilla.suse.com/855866">SUSE bug 855866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449" source="SUSE CVE"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0012-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0015-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<bugzilla href="https://bugzilla.suse.com/856687">SUSE bug 856687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0049-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00032.html" source="SUSE-SU"/>
    <description>
    The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<bugzilla href="https://bugzilla.suse.com/857203">SUSE bug 857203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861384">SUSE bug 861384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0593-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html" source="SUSE-SU"/>
    <description>
    The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<bugzilla href="https://bugzilla.suse.com/857490">SUSE bug 857490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868943">SUSE bug 868943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6457" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
    <description>
    The libxlDomainGetNumaParameters function in the libxl driver (libxl/libxl_driver.c) in libvirt before 1.2.1 does not properly initialize the nodemap, which allows local users to cause a denial of service (invalid free operation and crash) or possibly execute arbitrary code via an inactive domain to the virsh numatune command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457</cve>
	<bugzilla href="https://bugzilla.suse.com/858824">SUSE bug 858824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0270-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html" source="SUSE-SU"/>
    <description>
    Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<bugzilla href="https://bugzilla.suse.com/857492">SUSE bug 857492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0073-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0075-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882908">SUSE bug 882908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108654" comment="libXfont1-1.4.7-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141437" comment="libXfont1-1.4.7-2.9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473" source="SUSE CVE"/>
    <description>
    Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473</cve>
	<bugzilla href="https://bugzilla.suse.com/866302">SUSE bug 866302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474</cve>
	<bugzilla href="https://bugzilla.suse.com/866302">SUSE bug 866302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475</cve>
	<bugzilla href="https://bugzilla.suse.com/866302">SUSE bug 866302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476" source="SUSE CVE"/>
    <description>
    The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476</cve>
	<bugzilla href="https://bugzilla.suse.com/866302">SUSE bug 866302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000865.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0742-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878540">SUSE bug 878540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6497" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00023.html" source="SUSE-SU"/>
    <description>
    clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906077">SUSE bug 906077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514966" comment="clamav-0.98.5-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0065-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<bugzilla href="https://bugzilla.suse.com/850430">SUSE bug 850430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880246">SUSE bug 880246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0065-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<bugzilla href="https://bugzilla.suse.com/850430">SUSE bug 850430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0100-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<bugzilla href="https://bugzilla.suse.com/856522">SUSE bug 856522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7041" ref_url="https://www.suse.com/security/cve/CVE-2013-7041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html" source="SUSE-SU"/>
    <description>
    The pam_userdb module for Pam uses a case-insensitive method to compare hashed passwords, which makes it easier for attackers to guess the password via a brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7041/">CVE-2013-7041</cve>
	<bugzilla href="https://bugzilla.suse.com/1123794">SUSE bug 1123794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334112" comment="pam is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7098" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7098" ref_url="https://www.suse.com/security/cve/CVE-2013-7098" source="SUSE CVE"/>
    <description>
    OpenConnect VPN client with GnuTLS before 5.02 contains a heap overflow if MTU is increased on reconnection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7098/">CVE-2013-7098</cve>
	<bugzilla href="https://bugzilla.suse.com/1163983">SUSE bug 1163983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512579" comment="openconnect-7.08-1.27 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512580" comment="openconnect-lang-7.08-1.27 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00014.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<bugzilla href="https://bugzilla.suse.com/856495">SUSE bug 856495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7171" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7171" ref_url="https://www.suse.com/security/cve/CVE-2013-7171" source="SUSE CVE"/>
    <description>
    Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2, contain world-writable permissions on the /tmp directory which could allow remote attackers to execute arbitrary code with root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7171/">CVE-2013-7171</cve>
	<bugzilla href="https://bugzilla.suse.com/1160908">SUSE bug 1160908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338849" comment="llvm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338850" comment="llvm6 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-12-25"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7285" ref_url="https://www.suse.com/security/cve/CVE-2013-7285" source="SUSE CVE"/>
    <description>
    Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7285/">CVE-2013-7285</cve>
	<bugzilla href="https://bugzilla.suse.com/1142383">SUSE bug 1142383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193824">SUSE bug 1193824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875241">SUSE bug 875241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0604-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0618-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0604-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0618-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7422" ref_url="https://www.suse.com/security/cve/CVE-2013-7422" source="SUSE CVE"/>
    <description>
    Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7422/">CVE-2013-7422</cve>
	<bugzilla href="https://bugzilla.suse.com/915514">SUSE bug 915514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514582" comment="glibc-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514583" comment="glibc-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514584" comment="glibc-devel-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514585" comment="glibc-devel-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514586" comment="glibc-i18ndata-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514587" comment="glibc-locale-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514588" comment="glibc-locale-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514589" comment="nscd-2.19-20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
    <description>
    Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allow remote attackers to have unspecified impact via a crafted request, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<bugzilla href="https://bugzilla.suse.com/927126">SUSE bug 927126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334058" comment="SDL is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334344" comment="libX11 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334055" comment="xorg-x11 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334345" comment="xorg-x11-driver-video is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333972" comment="xorg-x11-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7443" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7443" ref_url="https://www.suse.com/security/cve/CVE-2013-7443" source="SUSE CVE"/>
    <description>
    Buffer overflow in the skip-scan optimization in SQLite 3.8.2 allows remote attackers to cause a denial of service (crash) via crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-7443/">CVE-2013-7443</cve>
	<bugzilla href="https://bugzilla.suse.com/938555">SUSE bug 938555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0747-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0749-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0754-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0756-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002336.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2366-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2374-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00089.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140657" comment="gtk2-data-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140658" comment="gtk2-lang-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140659" comment="gtk2-tools-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140660" comment="gtk2-tools-32bit-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140661" comment="libgtk-2_0-0-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140662" comment="libgtk-2_0-0-32bit-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142126" comment="typelib-1_0-Gtk-2_0-2.24.31-7.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516551" comment="gtk2-lang-2.24.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516552" comment="gtk2-tools-2.24.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516553" comment="gtk2-tools-32bit-2.24.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516554" comment="libgtk-2_0-0-2.24.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516555" comment="libgtk-2_0-0-32bit-2.24.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516556" comment="typelib-1_0-Gtk-2_0-2.24.24-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7456" ref_url="https://www.suse.com/security/cve/CVE-2013-7456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00108.html" source="SUSE-SU"/>
    <description>
    gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7, allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted image that is mishandled by the imagescale function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7456/">CVE-2013-7456</cve>
	<bugzilla href="https://bugzilla.suse.com/982009">SUSE bug 982009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7470" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7470" ref_url="https://www.suse.com/security/cve/CVE-2013-7470" source="SUSE CVE"/>
    <description>
    cipso_v4_validate in include/net/cipso_ipv4.h in the Linux kernel before 3.11.7, when CONFIG_NETLABEL is disabled, allows attackers to cause a denial of service (infinite loop and crash), as demonstrated by icmpsic, a different vulnerability than CVE-2013-0310.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-7470/">CVE-2013-7470</cve>
	<bugzilla href="https://bugzilla.suse.com/1133087">SUSE bug 1133087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0389-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00053.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in udisks before 1.0.5 and 2.x before 2.1.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long mount point.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004</cve>
	<bugzilla href="https://bugzilla.suse.com/865854">SUSE bug 865854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0011" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011" source="SUSE CVE"/>
    <description>
    Multiple heap-based buffer overflows in the ZRLE_DECODE function in common/rfb/zrleDecode.h in TigerVNC before 1.3.1, when NDEBUG is enabled, allow remote VNC servers to cause a denial of service (vncviewer crash) and possibly execute arbitrary code via vectors related to screen image rendering.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011</cve>
	<bugzilla href="https://bugzilla.suse.com/869307">SUSE bug 869307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140770" comment="libXvnc1-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140771" comment="tigervnc-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140772" comment="xorg-x11-Xvnc-1.6.0-12.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141817" comment="tigervnc-1.3.0-17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141818" comment="xorg-x11-Xvnc-1.3.0-17.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142062" comment="tigervnc-1.4.3-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142063" comment="xorg-x11-Xvnc-1.4.3-7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154696" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154697" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154698" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512241" comment="libXvnc1-1.6.0-18.23.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512242" comment="tigervnc-1.6.0-18.23.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512243" comment="xorg-x11-Xvnc-1.6.0-18.23.72 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0175-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0267-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0274-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000758.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0366-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0370-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00040.html" source="SUSE-SU"/>
    <description>
    The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<bugzilla href="https://bugzilla.suse.com/866278">SUSE bug 866278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866286">SUSE bug 866286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141697" comment="libssh4-0.6.3-1.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0019" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0760-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927161">SUSE bug 927161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141804" comment="socat-1.7.2.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0028" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
    <description>
    libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028</cve>
	<bugzilla href="https://bugzilla.suse.com/859051">SUSE bug 859051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
    <description>
    The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038</cve>
	<bugzilla href="https://bugzilla.suse.com/860993">SUSE bug 860993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow.  NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871307">SUSE bug 871307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The "make check" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872783">SUSE bug 872783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<bugzilla href="https://bugzilla.suse.com/869945">SUSE bug 869945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077</cve>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870576">SUSE bug 870576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html" source="SUSE-SU"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<bugzilla href="https://bugzilla.suse.com/865804">SUSE bug 865804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915878">SUSE bug 915878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0100" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0100" ref_url="https://www.suse.com/security/cve/CVE-2014-0100" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
    <description>
    Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU load.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0100/">CVE-2014-0100</cve>
	<bugzilla href="https://bugzilla.suse.com/866101">SUSE bug 866101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0102" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0102" ref_url="https://www.suse.com/security/cve/CVE-2014-0102" source="SUSE CVE"/>
    <description>
    The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0102/">CVE-2014-0102</cve>
	<bugzilla href="https://bugzilla.suse.com/1066001">SUSE bug 1066001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866842">SUSE bug 866842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0948-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00038.html" source="SUSE-SU"/>
    <description>
    The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141828" comment="xalan-j2-2.7.0-264.133 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0114" ref_url="https://www.suse.com/security/cve/CVE-2014-0114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021937" ref_url="https://www.suse.com/support/kb/doc/?id=7021937" source="SUSE-SU"/>
    <description>
    Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-15"/>
	<updated date="2022-05-15"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0114/">CVE-2014-0114</cve>
	<bugzilla href="https://bugzilla.suse.com/778464">SUSE bug 778464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875455">SUSE bug 875455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885963">SUSE bug 885963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867723">SUSE bug 867723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869564">SUSE bug 869564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0530-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0598-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00009.html" source="SUSE-SU"/>
    <description>
    The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0530-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0598-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00009.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159043" comment="lftp-4.7.4-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512212" comment="lftp-4.7.4-3.3.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000876.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<bugzilla href="https://bugzilla.suse.com/873235">SUSE bug 873235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0155" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0155" ref_url="https://www.suse.com/security/cve/CVE-2014-0155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
    <description>
    The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC.  NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-0155/">CVE-2014-0155</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872540">SUSE bug 872540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2014:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7014878" ref_url="https://www.suse.com/support/kb/doc/?id=7014878" source="SUSE-SU"/>
		<reference ref_id="TID7014879" ref_url="https://www.suse.com/support/kb/doc?id=7014879" source="SUSE-SU"/>
		<reference ref_id="TID7014920" ref_url="https://www.suse.com/support/kb/doc/?id=7014920" source="SUSE-SU"/>
		<reference ref_id="TID7014929" ref_url="https://www.suse.com/support/kb/doc/?id=7014929" source="SUSE-SU"/>
		<reference ref_id="TID7014961" ref_url="https://www.suse.com/support/kb/doc/?id=7014961" source="SUSE-SU"/>
		<reference ref_id="TID7014998" ref_url="https://www.suse.com/support/kb/doc/?id=7014998" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021489" ref_url="https://www.suse.com/support/kb/doc/?id=7021489" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021874" ref_url="https://www.suse.com/support/kb/doc/?id=7021874" source="SUSE-SU"/>
		<reference ref_id="TID7021901" ref_url="https://www.suse.com/support/kb/doc/?id=7021901" source="SUSE-SU"/>
		<reference ref_id="TID7021974" ref_url="https://www.suse.com/support/kb/doc/?id=7021974" source="SUSE-SU"/>
		<reference ref_id="TID7021992" ref_url="https://www.suse.com/support/kb/doc/?id=7021992" source="SUSE-SU"/>
		<reference ref_id="TID7022038" ref_url="https://www.suse.com/support/kb/doc/?id=7022038" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00079.html" source="SUSE-SU"/>
    <description>
    The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<bugzilla href="https://bugzilla.suse.com/872299">SUSE bug 872299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0172" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00005.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172</cve>
	<bugzilla href="https://bugzilla.suse.com/872785">SUSE bug 872785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106104" comment="libelf-devel-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141304" comment="elfutils-0.158-3.200 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141305" comment="libasm1-0.158-3.200 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141306" comment="libdw1-0.158-3.200 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141307" comment="libdw1-32bit-0.158-3.200 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141308" comment="libebl1-0.158-3.200 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141309" comment="libebl1-32bit-0.158-3.200 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141310" comment="libelf1-0.158-3.200 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141311" comment="libelf1-32bit-0.158-3.200 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<bugzilla href="https://bugzilla.suse.com/872396">SUSE bug 872396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0650-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html" source="SUSE-SU"/>
    <description>
    libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181</cve>
	<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0182" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<bugzilla href="https://bugzilla.suse.com/874788">SUSE bug 874788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964693">SUSE bug 964693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0190" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html" source="SUSE-SU"/>
    <description>
    The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<bugzilla href="https://bugzilla.suse.com/875470">SUSE bug 875470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0701-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0716-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0741-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0753-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
    <description>
    The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876652">SUSE bug 876652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996079">SUSE bug 996079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517391" comment="libxml2-2-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517392" comment="libxml2-2-32bit-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517393" comment="libxml2-tools-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517394" comment="python-libxml2-2.9.1-26.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="TID7015061" ref_url="https://www.suse.com/support/kb/doc?id=7015061" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<bugzilla href="https://bugzilla.suse.com/871252">SUSE bug 871252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879878">SUSE bug 879878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933423">SUSE bug 933423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0634-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html" source="SUSE-SU"/>
    <description>
    The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<bugzilla href="https://bugzilla.suse.com/876282">SUSE bug 876282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108654" comment="libXfont1-1.4.7-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141437" comment="libXfont1-1.4.7-2.9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108654" comment="libXfont1-1.4.7-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141437" comment="libXfont1-1.4.7-2.9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108654" comment="libXfont1-1.4.7-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141437" comment="libXfont1-1.4.7-2.9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015158" ref_url="https://www.suse.com/support/kb/doc/?id=7015158" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021432" ref_url="https://www.suse.com/support/kb/doc/?id=7021432" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021739" ref_url="https://www.suse.com/support/kb/doc/?id=7021739" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021990" ref_url="https://www.suse.com/support/kb/doc/?id=7021990" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903703">SUSE bug 903703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905018">SUSE bug 905018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914447">SUSE bug 914447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515125" comment="libopenssl0_9_8-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515126" comment="libopenssl0_9_8-32bit-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
    <description>
    The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<bugzilla href="https://bugzilla.suse.com/878642">SUSE bug 878642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00034.html" source="SUSE-SU"/>
    <description>
    The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0245" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0245" ref_url="https://www.suse.com/security/cve/CVE-2014-0245" source="SUSE CVE"/>
    <description>
    It was found that the implementation of the GTNSubjectCreatingInterceptor class in gatein-wsrp was not thread safe. For a specific WSRP endpoint, under high-concurrency scenarios or scenarios where SOAP messages take long to execute, it was possible for an unauthenticated remote attacker to gain privileged information if WS-Security is enabled for the WSRP Consumer, and the endpoint in question is being used by a privileged user. This affects JBoss Portal 6.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0245/">CVE-2014-0245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0247" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0247" ref_url="https://www.suse.com/security/cve/CVE-2014-0247" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0860-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00006.html" source="SUSE-SU"/>
    <description>
    LibreOffice 4.2.4 executes unspecified VBA macros automatically, which has unspecified impact and attack vectors, possibly related to doc/docmacromode.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0247/">CVE-2014-0247</cve>
	<bugzilla href="https://bugzilla.suse.com/879996">SUSE bug 879996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141630" comment="libreoffice-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141631" comment="libreoffice-base-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141632" comment="libreoffice-base-drivers-mysql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141633" comment="libreoffice-base-drivers-postgresql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141634" comment="libreoffice-calc-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141635" comment="libreoffice-calc-extensions-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141636" comment="libreoffice-draw-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141637" comment="libreoffice-filters-optional-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141638" comment="libreoffice-gnome-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141639" comment="libreoffice-icon-theme-tango-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141640" comment="libreoffice-impress-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141641" comment="libreoffice-l10n-af-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141642" comment="libreoffice-l10n-ar-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141643" comment="libreoffice-l10n-ca-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141644" comment="libreoffice-l10n-cs-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141645" comment="libreoffice-l10n-da-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141646" comment="libreoffice-l10n-de-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141647" comment="libreoffice-l10n-en-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141648" comment="libreoffice-l10n-es-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141649" comment="libreoffice-l10n-fi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141650" comment="libreoffice-l10n-fr-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141651" comment="libreoffice-l10n-gu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141652" comment="libreoffice-l10n-hi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141653" comment="libreoffice-l10n-hu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141654" comment="libreoffice-l10n-it-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141655" comment="libreoffice-l10n-ja-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141656" comment="libreoffice-l10n-ko-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141657" comment="libreoffice-l10n-nb-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141658" comment="libreoffice-l10n-nl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141659" comment="libreoffice-l10n-nn-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141660" comment="libreoffice-l10n-pl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141661" comment="libreoffice-l10n-pt-BR-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141662" comment="libreoffice-l10n-pt-PT-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141663" comment="libreoffice-l10n-ru-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141664" comment="libreoffice-l10n-sk-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141665" comment="libreoffice-l10n-sv-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141666" comment="libreoffice-l10n-xh-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141667" comment="libreoffice-l10n-zh-Hans-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141668" comment="libreoffice-l10n-zh-Hant-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141669" comment="libreoffice-l10n-zu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141670" comment="libreoffice-mailmerge-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141671" comment="libreoffice-math-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141672" comment="libreoffice-officebean-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141673" comment="libreoffice-pyuno-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141674" comment="libreoffice-writer-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141675" comment="libreoffice-writer-extensions-4.3.1.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0249" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0249" ref_url="https://www.suse.com/security/cve/CVE-2014-0249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002342.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1407-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2651-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00103.html" source="SUSE-SU"/>
    <description>
    The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0249/">CVE-2014-0249</cve>
	<bugzilla href="https://bugzilla.suse.com/880245">SUSE bug 880245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516562" comment="libipa_hbac0-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516563" comment="libsss_idmap0-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516564" comment="libsss_sudo-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516565" comment="python-sssd-config-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516566" comment="sssd-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516567" comment="sssd-32bit-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516568" comment="sssd-ad-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516569" comment="sssd-ipa-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516570" comment="sssd-krb5-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516571" comment="sssd-krb5-common-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516572" comment="sssd-ldap-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516573" comment="sssd-proxy-1.11.5.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516574" comment="sssd-tools-1.11.5.1-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0250" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002324.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0862-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in client/X11/xf_graphics.c in FreeRDP allow remote attackers to have an unspecified impact via the width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress function, which causes an incorrect amount of memory to be allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<bugzilla href="https://bugzilla.suse.com/880317">SUSE bug 880317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975218">SUSE bug 975218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141342" comment="freerdp-1.0.2-7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141343" comment="libfreerdp-1_0-1.0.2-7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141344" comment="libfreerdp-1_0-plugins-1.0.2-7.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142100" comment="freerdp-2.0.0~git.1463131968.4e66df7-11.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142101" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-11.69 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516528" comment="freerdp-1.0.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516529" comment="libfreerdp-1_0-1.0.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516530" comment="libfreerdp-1_0-plugins-1.0.2-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0333" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0358-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00029.html" source="SUSE-SU"/>
    <description>
    The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333</cve>
	<bugzilla href="https://bugzilla.suse.com/866298">SUSE bug 866298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to throwing of an incorrect exception when SnmpStatusException should have been used in the SNMP implementation, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAXP.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an improper check for "code permissions when creating document builder factories."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45, when running on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information about encryption keys via a timing discrepancy during the TLS/SSL handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAAS.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to how principals are set for the Subject class, which allows attackers to escape the sandbox using deserialization of a crafted Subject instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to missing package access checks in the Naming / JNDI component, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote authenticated users to affect confidentiality and availability via unknown vectors related to Beans.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability in DocumentHandler.java, related to Beans decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to "insufficient security checks in IIOP streams," which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-2412.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0458 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-2402.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0434-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0436-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105068" comment="mutt-1.5.21-49.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141043" comment="mutt-1.6.0-54.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141757" comment="mutt-1.5.21-44.38 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<bugzilla href="https://bugzilla.suse.com/887022">SUSE bug 887022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0491" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0491" ref_url="https://www.suse.com/security/cve/CVE-2014-0491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0126-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK &amp; Compiler before 4.0.0.1390 allow attackers to bypass unspecified protection mechanisms via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0491/">CVE-2014-0491</cve>
	<bugzilla href="https://bugzilla.suse.com/858822">SUSE bug 858822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0492" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0492" ref_url="https://www.suse.com/security/cve/CVE-2014-0492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0126-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK &amp; Compiler before 4.0.0.1390 allow attackers to defeat the ASLR protection mechanism by leveraging an "address leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0492/">CVE-2014-0492</cve>
	<bugzilla href="https://bugzilla.suse.com/858822">SUSE bug 858822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0497" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0497" ref_url="https://www.suse.com/security/cve/CVE-2014-0497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0497/">CVE-2014-0497</cve>
	<bugzilla href="https://bugzilla.suse.com/862288">SUSE bug 862288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0498" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0498" ref_url="https://www.suse.com/security/cve/CVE-2014-0498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK &amp; Compiler before 4.0.0.1628 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0498/">CVE-2014-0498</cve>
	<bugzilla href="https://bugzilla.suse.com/865021">SUSE bug 865021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0499" ref_url="https://www.suse.com/security/cve/CVE-2014-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK &amp; Compiler before 4.0.0.1628 do not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0499/">CVE-2014-0499</cve>
	<bugzilla href="https://bugzilla.suse.com/865021">SUSE bug 865021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0502" ref_url="https://www.suse.com/security/cve/CVE-2014-0502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK &amp; Compiler before 4.0.0.1628 allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0502/">CVE-2014-0502</cve>
	<bugzilla href="https://bugzilla.suse.com/865021">SUSE bug 865021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0503" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0503" ref_url="https://www.suse.com/security/cve/CVE-2014-0503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0503/">CVE-2014-0503</cve>
	<bugzilla href="https://bugzilla.suse.com/867808">SUSE bug 867808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0506" ref_url="https://www.suse.com/security/cve/CVE-2014-0506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0520-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK &amp; Compiler before 13.0.0.83 allows remote attackers to execute arbitrary code, and possibly bypass an Internet Explorer sandbox protection mechanism, via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0506/">CVE-2014-0506</cve>
	<bugzilla href="https://bugzilla.suse.com/872692">SUSE bug 872692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0507" ref_url="https://www.suse.com/security/cve/CVE-2014-0507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0520-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK &amp; Compiler before 13.0.0.83 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0507/">CVE-2014-0507</cve>
	<bugzilla href="https://bugzilla.suse.com/872692">SUSE bug 872692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0508" ref_url="https://www.suse.com/security/cve/CVE-2014-0508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0520-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK &amp; Compiler before 13.0.0.83 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0508/">CVE-2014-0508</cve>
	<bugzilla href="https://bugzilla.suse.com/872692">SUSE bug 872692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0509" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0509" ref_url="https://www.suse.com/security/cve/CVE-2014-0509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0520-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK &amp; Compiler before 13.0.0.83 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0509/">CVE-2014-0509</cve>
	<bugzilla href="https://bugzilla.suse.com/872692">SUSE bug 872692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0515" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0515" ref_url="https://www.suse.com/security/cve/CVE-2014-0515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in April 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0515/">CVE-2014-0515</cve>
	<bugzilla href="https://bugzilla.suse.com/875577">SUSE bug 875577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0516" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0516" ref_url="https://www.suse.com/security/cve/CVE-2014-0516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0516/">CVE-2014-0516</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0517" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0517" ref_url="https://www.suse.com/security/cve/CVE-2014-0517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0518, CVE-2014-0519, and CVE-2014-0520.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0517/">CVE-2014-0517</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0518" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0518" ref_url="https://www.suse.com/security/cve/CVE-2014-0518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0519, and CVE-2014-0520.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0518/">CVE-2014-0518</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0519" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0519" ref_url="https://www.suse.com/security/cve/CVE-2014-0519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0518, and CVE-2014-0520.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0519/">CVE-2014-0519</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0520" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0520" ref_url="https://www.suse.com/security/cve/CVE-2014-0520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0518, and CVE-2014-0519.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0520/">CVE-2014-0520</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0531" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0531" ref_url="https://www.suse.com/security/cve/CVE-2014-0531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-0532 and CVE-2014-0533.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0531/">CVE-2014-0531</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0532" ref_url="https://www.suse.com/security/cve/CVE-2014-0532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-0531 and CVE-2014-0533.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0532/">CVE-2014-0532</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0533" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0533" ref_url="https://www.suse.com/security/cve/CVE-2014-0533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-0531 and CVE-2014-0532.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0533/">CVE-2014-0533</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0534" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0534" ref_url="https://www.suse.com/security/cve/CVE-2014-0534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0535.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0534/">CVE-2014-0534</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0535" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0535" ref_url="https://www.suse.com/security/cve/CVE-2014-0535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0534.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0535/">CVE-2014-0535</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0536" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0536" ref_url="https://www.suse.com/security/cve/CVE-2014-0536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0536/">CVE-2014-0536</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0537" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0537" ref_url="https://www.suse.com/security/cve/CVE-2014-0537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0539.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0537/">CVE-2014-0537</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886472">SUSE bug 886472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0538" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0538" ref_url="https://www.suse.com/security/cve/CVE-2014-0538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0538/">CVE-2014-0538</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0539" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0539" ref_url="https://www.suse.com/security/cve/CVE-2014-0539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0537.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0539/">CVE-2014-0539</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886472">SUSE bug 886472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0540" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0540" ref_url="https://www.suse.com/security/cve/CVE-2014-0540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, and CVE-2014-0545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0540/">CVE-2014-0540</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0541" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0541" ref_url="https://www.suse.com/security/cve/CVE-2014-0541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 allow attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0541/">CVE-2014-0541</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0542" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0542" ref_url="https://www.suse.com/security/cve/CVE-2014-0542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0543, CVE-2014-0544, and CVE-2014-0545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0542/">CVE-2014-0542</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0543" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0543" ref_url="https://www.suse.com/security/cve/CVE-2014-0543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0542, CVE-2014-0544, and CVE-2014-0545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0543/">CVE-2014-0543</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0544" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0544" ref_url="https://www.suse.com/security/cve/CVE-2014-0544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, and CVE-2014-0545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0544/">CVE-2014-0544</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0545" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0545" ref_url="https://www.suse.com/security/cve/CVE-2014-0545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, and CVE-2014-0544.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0545/">CVE-2014-0545</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0547" ref_url="https://www.suse.com/security/cve/CVE-2014-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0547/">CVE-2014-0547</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0548" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0548" ref_url="https://www.suse.com/security/cve/CVE-2014-0548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0548/">CVE-2014-0548</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0549" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0549" ref_url="https://www.suse.com/security/cve/CVE-2014-0549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0549/">CVE-2014-0549</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0550" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0550" ref_url="https://www.suse.com/security/cve/CVE-2014-0550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0549, CVE-2014-0551, CVE-2014-0552, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0550/">CVE-2014-0550</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0551" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0551" ref_url="https://www.suse.com/security/cve/CVE-2014-0551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0549, CVE-2014-0550, CVE-2014-0552, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0551/">CVE-2014-0551</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0552" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0552" ref_url="https://www.suse.com/security/cve/CVE-2014-0552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0552/">CVE-2014-0552</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0553" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0553" ref_url="https://www.suse.com/security/cve/CVE-2014-0553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0553/">CVE-2014-0553</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0554" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0554" ref_url="https://www.suse.com/security/cve/CVE-2014-0554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0554/">CVE-2014-0554</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0555" ref_url="https://www.suse.com/security/cve/CVE-2014-0555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, and CVE-2014-0552.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0555/">CVE-2014-0555</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0556" ref_url="https://www.suse.com/security/cve/CVE-2014-0556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0559.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0556/">CVE-2014-0556</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0557" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0557" ref_url="https://www.suse.com/security/cve/CVE-2014-0557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0557/">CVE-2014-0557</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0558" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0558" ref_url="https://www.suse.com/security/cve/CVE-2014-0558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK &amp; Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0564.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0558/">CVE-2014-0558</cve>
	<bugzilla href="https://bugzilla.suse.com/901334">SUSE bug 901334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514443" comment="flash-player-11.2.202.411-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514444" comment="flash-player-gnome-11.2.202.411-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0559" ref_url="https://www.suse.com/security/cve/CVE-2014-0559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0556.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0559/">CVE-2014-0559</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0564" ref_url="https://www.suse.com/security/cve/CVE-2014-0564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK &amp; Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0558.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0564/">CVE-2014-0564</cve>
	<bugzilla href="https://bugzilla.suse.com/901334">SUSE bug 901334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514443" comment="flash-player-11.2.202.411-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514444" comment="flash-player-gnome-11.2.202.411-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0569" ref_url="https://www.suse.com/security/cve/CVE-2014-0569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK &amp; Compiler before 15.0.0.302 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0569/">CVE-2014-0569</cve>
	<bugzilla href="https://bugzilla.suse.com/901334">SUSE bug 901334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514443" comment="flash-player-11.2.202.411-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514444" comment="flash-player-gnome-11.2.202.411-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0573" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0573" ref_url="https://www.suse.com/security/cve/CVE-2014-0573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0588 and CVE-2014-8438.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0573/">CVE-2014-0573</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0574" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0576" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0576" ref_url="https://www.suse.com/security/cve/CVE-2014-0576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0581, CVE-2014-8440, and CVE-2014-8441.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0576/">CVE-2014-0576</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0577" ref_url="https://www.suse.com/security/cve/CVE-2014-0577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0577/">CVE-2014-0577</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0578" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0578" ref_url="https://www.suse.com/security/cve/CVE-2014-0578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, and CVE-2015-5116.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0578/">CVE-2014-0578</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0580" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0580" ref_url="https://www.suse.com/security/cve/CVE-2014-0580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0580/">CVE-2014-0580</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514377" comment="flash-player-11.2.202.425-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514378" comment="flash-player-gnome-11.2.202.425-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0581" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0581" ref_url="https://www.suse.com/security/cve/CVE-2014-0581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-8440, and CVE-2014-8441.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0581/">CVE-2014-0581</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0582" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0582" ref_url="https://www.suse.com/security/cve/CVE-2014-0582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0589.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0582/">CVE-2014-0582</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0583" ref_url="https://www.suse.com/security/cve/CVE-2014-0583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to complete a transition from Low Integrity to Medium Integrity via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0583/">CVE-2014-0583</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0584" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0584" ref_url="https://www.suse.com/security/cve/CVE-2014-0584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0584/">CVE-2014-0584</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0585" ref_url="https://www.suse.com/security/cve/CVE-2014-0585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0586, and CVE-2014-0590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0585/">CVE-2014-0585</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0586" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0586" ref_url="https://www.suse.com/security/cve/CVE-2014-0586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0586/">CVE-2014-0586</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0587" ref_url="https://www.suse.com/security/cve/CVE-2014-0587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9164.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0587/">CVE-2014-0587</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514377" comment="flash-player-11.2.202.425-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514378" comment="flash-player-gnome-11.2.202.425-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0588" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0588" ref_url="https://www.suse.com/security/cve/CVE-2014-0588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0573 and CVE-2014-8438.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0588/">CVE-2014-0588</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0589" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0589" ref_url="https://www.suse.com/security/cve/CVE-2014-0589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0582.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0589/">CVE-2014-0589</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0590" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0590" ref_url="https://www.suse.com/security/cve/CVE-2014-0590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0586.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0590/">CVE-2014-0590</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00019.html" source="SUSE-SU"/>
    <description>
    The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0691" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691" source="SUSE CVE"/>
    <description>
    Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0791" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002324.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0862-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2402-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<bugzilla href="https://bugzilla.suse.com/857491">SUSE bug 857491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975218">SUSE bug 975218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141342" comment="freerdp-1.0.2-7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141343" comment="libfreerdp-1_0-1.0.2-7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141344" comment="libfreerdp-1_0-plugins-1.0.2-7.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142100" comment="freerdp-2.0.0~git.1463131968.4e66df7-11.69 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142101" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-11.69 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516528" comment="freerdp-1.0.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516529" comment="libfreerdp-1_0-1.0.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516530" comment="libfreerdp-1_0-plugins-1.0.2-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10070" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070</cve>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10071" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the "&gt;&amp; fd" syntax.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071</cve>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10072" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072</cve>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1344" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<bugzilla href="https://bugzilla.suse.com/879607">SUSE bug 879607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1384" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1385" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1386" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1387" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1388" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1389" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1390" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0270-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html" source="SUSE-SU"/>
    <description>
    Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<bugzilla href="https://bugzilla.suse.com/858817">SUSE bug 858817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862345">SUSE bug 862345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the MPostWriteBarrier class in js/src/jit/MIR.h and stack alignment in js/src/jit/AsmJS.cpp in OdinMonkey, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862348">SUSE bug 862348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862309">SUSE bug 862309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862356">SUSE bug 862356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862360">SUSE bug 862360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862300">SUSE bug 862300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862289">SUSE bug 862289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129286" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129287" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141755" comment="mozilla-nspr-4.10.7-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141756" comment="mozilla-nspr-32bit-4.10.7-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155320" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155321" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 do not properly initialize memory for GIF rendering, which allows remote attackers to obtain sensitive information from process memory via crafted web script that interacts with a CANVAS element associated with a malformed GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898959">SUSE bug 898959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514746" comment="MozillaFirefox-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514747" comment="MozillaFirefox-translations-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514748" comment="libfreebl3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514749" comment="libfreebl3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514750" comment="libsoftokn3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514751" comment="libsoftokn3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514752" comment="mozilla-nss-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514753" comment="mozilla-nss-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514754" comment="mozilla-nss-certs-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514755" comment="mozilla-nss-certs-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514756" comment="mozilla-nss-tools-3.17.3-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
    <description>
    The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1624" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1624" ref_url="https://www.suse.com/security/cve/CVE-2014-1624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2719-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006123.html" source="SUSE-SU"/>
    <description>
    Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allows local users to overwrite arbitrary files by pre-creating /tmp/pyxdg-runtime-dir-fallback-victim to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the get_runtime_dir function is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-1624/">CVE-2014-1624</cve>
	<bugzilla href="https://bugzilla.suse.com/859835">SUSE bug 859835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334348" comment="python-xdg is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522258" comment="python-xdg-0.25-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737</cve>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738</cve>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0783-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748</cve>
	<bugzilla href="https://bugzilla.suse.com/909707">SUSE bug 909707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1829" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829</cve>
	<bugzilla href="https://bugzilla.suse.com/897658">SUSE bug 897658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141086" comment="python-requests-2.8.1-6.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142047" comment="python-requests-2.3.0-6.5.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159273" comment="python-requests-2.8.1-6.16.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512600" comment="python-requests-2.11.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139059" comment="python3-requests-2.7.0-2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1830" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830</cve>
	<bugzilla href="https://bugzilla.suse.com/897658">SUSE bug 897658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141086" comment="python-requests-2.8.1-6.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142047" comment="python-requests-2.3.0-6.5.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159273" comment="python-requests-2.8.1-6.16.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512600" comment="python-requests-2.11.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139059" comment="python3-requests-2.7.0-2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<bugzilla href="https://bugzilla.suse.com/863305">SUSE bug 863305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0518-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0597-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-10"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<bugzilla href="https://bugzilla.suse.com/1049392">SUSE bug 1049392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141605" comment="libpython2_7-1_0-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141606" comment="libpython2_7-1_0-32bit-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141607" comment="python-base-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141608" comment="python-devel-2.7.7-2.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141609" comment="python-xml-2.7.7-2.36 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0591-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921566">SUSE bug 921566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141787" comment="python-imaging-1.1.7-21.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959" source="SUSE CVE"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959</cve>
	<bugzilla href="https://bugzilla.suse.com/863989">SUSE bug 863989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865993">SUSE bug 865993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<bugzilla href="https://bugzilla.suse.com/867620">SUSE bug 867620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241" source="SUSE CVE"/>
    <description>
    The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241</cve>
	<bugzilla href="https://bugzilla.suse.com/867620">SUSE bug 867620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
    <description>
    The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2284" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0398-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html" source="SUSE-SU"/>
    <description>
    The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<bugzilla href="https://bugzilla.suse.com/866942">SUSE bug 866942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875217">SUSE bug 875217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141682" comment="libsnmp30-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141683" comment="libsnmp30-32bit-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141684" comment="net-snmp-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141685" comment="perl-SNMP-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141686" comment="snmp-mibs-5.7.2.1-3.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512467" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512468" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512469" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512470" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512471" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2285" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0398-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html" source="SUSE-SU"/>
    <description>
    The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<bugzilla href="https://bugzilla.suse.com/866942">SUSE bug 866942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875217">SUSE bug 875217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141682" comment="libsnmp30-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141683" comment="libsnmp30-32bit-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141684" comment="net-snmp-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141685" comment="perl-SNMP-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141686" comment="snmp-mibs-5.7.2.1-3.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512467" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512468" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512469" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512470" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512471" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2309" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867531">SUSE bug 867531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2338" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0697-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0700-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html" source="SUSE-SU"/>
    <description>
    IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<bugzilla href="https://bugzilla.suse.com/870572">SUSE bug 870572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141806" comment="strongswan-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141807" comment="strongswan-doc-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141808" comment="strongswan-ipsec-5.1.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141809" comment="strongswan-libs0-5.1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-0455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u60 and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-4223. NOTE: the previous information is from the July 2014 CPU. Oracle has not commented on another vendor's claim that the issue is related to improper restriction of the "use of privileged annotations."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2490" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 7u60 and SE 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0873-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0784-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0786-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00025.html" source="SUSE-SU"/>
    <description>
    The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<bugzilla href="https://bugzilla.suse.com/868624">SUSE bug 868624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009109545" comment="gd-2.1.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109546" comment="gd-32bit-2.1.0-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141350" comment="gd-2.1.0-3.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141351" comment="gd-32bit-2.1.0-3.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523</cve>
	<bugzilla href="https://bugzilla.suse.com/868653">SUSE bug 868653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html" source="SUSE-SU"/>
    <description>
    The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<bugzilla href="https://bugzilla.suse.com/868822">SUSE bug 868822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142078" comment="bash-lang-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141221" comment="bash-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141222" comment="bash-doc-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141223" comment="bash-lang-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141224" comment="libreadline6-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141225" comment="libreadline6-32bit-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141226" comment="readline-doc-6.2-75.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155548" comment="bash-lang-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0500-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<bugzilla href="https://bugzilla.suse.com/868944">SUSE bug 868944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141752" comment="libyaml-0-2-0.1.6-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514734" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2568" ref_url="https://www.suse.com/security/cve/CVE-2014-2568" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2568/">CVE-2014-2568</cve>
	<bugzilla href="https://bugzilla.suse.com/869564">SUSE bug 869564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000812.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141764" comment="pam-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141765" comment="pam-32bit-1.1.8-11.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141766" comment="pam-doc-1.1.8-11.57 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512585" comment="pam-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512586" comment="pam-32bit-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512587" comment="pam-doc-1.1.8-24.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000878.html" source="SUSE-SU"/>
    <description>
    The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870532">SUSE bug 870532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114322" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114325" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141762" comment="openssh-6.6p1-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141763" comment="openssh-helpers-6.6p1-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0596-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0597-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<bugzilla href="https://bugzilla.suse.com/871152">SUSE bug 871152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
    <description>
    Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672</cve>
	<bugzilla href="https://bugzilla.suse.com/871148">SUSE bug 871148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
    <description>
    The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678</cve>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707" source="SUSE CVE"/>
    <description>
    cups-browsed in cups-filters 1.0.41 before 1.0.51 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the (1) model or (2) PDL, related to "System V interface scripts generated for queues."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883543">SUSE bug 883543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2830" ref_url="https://www.suse.com/security/cve/CVE-2014-2830" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2830/">CVE-2014-2830</cve>
	<bugzilla href="https://bugzilla.suse.com/870168">SUSE bug 870168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334349" comment="cifs-utils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2855" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0595-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00006.html" source="SUSE-SU"/>
    <description>
    The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855</cve>
	<bugzilla href="https://bugzilla.suse.com/873740">SUSE bug 873740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141801" comment="rsync-3.1.0-2.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856" source="SUSE CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856</cve>
	<bugzilla href="https://bugzilla.suse.com/873899">SUSE bug 873899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2892" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0590-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00001.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<bugzilla href="https://bugzilla.suse.com/874723">SUSE bug 874723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2907" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00022.html" source="SUSE-SU"/>
    <description>
    The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907</cve>
	<bugzilla href="https://bugzilla.suse.com/874693">SUSE bug 874693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874760">SUSE bug 874760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2977" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.13 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<bugzilla href="https://bugzilla.suse.com/878345">SUSE bug 878345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009109224" comment="DirectFB-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109231" comment="lib++dfb-1_7-1-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109233" comment="libdirectfb-1_7-1-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109234" comment="libdirectfb-1_7-1-32bit-1.7.1-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142073" comment="libdirectfb-1_7-1-32bit-1.7.1-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514679" comment="DirectFB-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514680" comment="lib++dfb-1_7-1-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514681" comment="libdirectfb-1_7-1-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514682" comment="libdirectfb-1_7-1-32bit-1.7.1-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00019.html" source="SUSE-SU"/>
    <description>
    The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<bugzilla href="https://bugzilla.suse.com/878349">SUSE bug 878349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009109224" comment="DirectFB-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109231" comment="lib++dfb-1_7-1-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109233" comment="libdirectfb-1_7-1-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109234" comment="libdirectfb-1_7-1-32bit-1.7.1-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142073" comment="libdirectfb-1_7-1-32bit-1.7.1-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514679" comment="DirectFB-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514680" comment="lib++dfb-1_7-1-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514681" comment="libdirectfb-1_7-1-1.7.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514682" comment="libdirectfb-1_7-1-32bit-1.7.1-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page table translations for unspecified memory page types.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<bugzilla href="https://bugzilla.suse.com/875668">SUSE bug 875668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.html" source="SUSE-SU"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882228">SUSE bug 882228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00026.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141072" comment="ppp-2.4.7-1.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148440" comment="ppp-2.4.7-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181</cve>
	<bugzilla href="https://bugzilla.suse.com/896382">SUSE bug 896382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184</cve>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185</cve>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186</cve>
	<bugzilla href="https://bugzilla.suse.com/896392">SUSE bug 896392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3230" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0710-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00072.html" source="SUSE-SU"/>
    <description>
    The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<bugzilla href="https://bugzilla.suse.com/876862">SUSE bug 876862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000903.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141328" comment="facter-2.0.2-1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141860" comment="facter-2.0.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141860" comment="facter-2.0.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159633" comment="facter-2.4.6-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512121" comment="facter-2.4.6-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3253" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3253" ref_url="https://www.suse.com/security/cve/CVE-2014-3253" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3253/">CVE-2014-3253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141312" comment="emacs-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141313" comment="emacs-info-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141314" comment="emacs-x11-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141315" comment="etags-24.3-14.44 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158975" comment="emacs-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158977" comment="emacs-info-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158979" comment="emacs-x11-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158980" comment="etags-24.3-19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009164489" comment="emacs-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164490" comment="emacs-info-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164491" comment="emacs-x11-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164492" comment="etags-24.3-25.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141312" comment="emacs-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141313" comment="emacs-info-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141314" comment="emacs-x11-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141315" comment="etags-24.3-14.44 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158975" comment="emacs-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158977" comment="emacs-info-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158979" comment="emacs-x11-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158980" comment="etags-24.3-19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009164489" comment="emacs-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164490" comment="emacs-info-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164491" comment="emacs-x11-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164492" comment="etags-24.3-25.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141312" comment="emacs-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141313" comment="emacs-info-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141314" comment="emacs-x11-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141315" comment="etags-24.3-14.44 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158975" comment="emacs-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158977" comment="emacs-info-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158979" comment="emacs-x11-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158980" comment="etags-24.3-19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009164489" comment="emacs-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164490" comment="emacs-info-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164491" comment="emacs-x11-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164492" comment="etags-24.3-25.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141312" comment="emacs-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141313" comment="emacs-info-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141314" comment="emacs-x11-24.3-14.44 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141315" comment="etags-24.3-14.44 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158975" comment="emacs-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158977" comment="emacs-info-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158979" comment="emacs-x11-24.3-19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158980" comment="etags-24.3-19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009164489" comment="emacs-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164490" comment="emacs-info-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164491" comment="emacs-x11-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164492" comment="etags-24.3-25.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
    <description>
    hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0758-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0763-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009109692" comment="libtasn1-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109693" comment="libtasn1-6-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109694" comment="libtasn1-6-32bit-3.7-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141700" comment="libtasn1-3.7-2.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141701" comment="libtasn1-6-3.7-2.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141702" comment="libtasn1-6-32bit-3.7-2.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159215" comment="libtasn1-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159216" comment="libtasn1-6-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159217" comment="libtasn1-6-32bit-4.9-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170495" comment="libtasn1-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170496" comment="libtasn1-6-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170497" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009109692" comment="libtasn1-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109693" comment="libtasn1-6-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109694" comment="libtasn1-6-32bit-3.7-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141700" comment="libtasn1-3.7-2.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141701" comment="libtasn1-6-3.7-2.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141702" comment="libtasn1-6-32bit-3.7-2.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159215" comment="libtasn1-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159216" comment="libtasn1-6-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159217" comment="libtasn1-6-32bit-4.9-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170495" comment="libtasn1-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170496" comment="libtasn1-6-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170497" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009109692" comment="libtasn1-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109693" comment="libtasn1-6-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109694" comment="libtasn1-6-32bit-3.7-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141700" comment="libtasn1-3.7-2.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141701" comment="libtasn1-6-3.7-2.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141702" comment="libtasn1-6-32bit-3.7-2.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159215" comment="libtasn1-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159216" comment="libtasn1-6-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159217" comment="libtasn1-6-32bit-4.9-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170495" comment="libtasn1-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170496" comment="libtasn1-6-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170497" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000891.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0821-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0874-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html" source="SUSE-SU"/>
    <description>
    The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<bugzilla href="https://bugzilla.suse.com/1010769">SUSE bug 1010769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881137">SUSE bug 881137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00034.html" source="SUSE-SU"/>
    <description>
    The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<bugzilla href="https://bugzilla.suse.com/878642">SUSE bug 878642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890767">SUSE bug 890767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890768">SUSE bug 890768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890769">SUSE bug 890769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016328" ref_url="https://www.suse.com/support/kb/doc/?id=7016328" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950708">SUSE bug 950708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890766">SUSE bug 890766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890770">SUSE bug 890770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890771">SUSE bug 890771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890772">SUSE bug 890772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00059.html" source="SUSE-SU"/>
    <description>
    Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514519" comment="libopenssl1_0_0-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514520" comment="libopenssl1_0_0-32bit-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514521" comment="openssl-1.0.1i-9.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3524" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3524" ref_url="https://www.suse.com/security/cve/CVE-2014-3524" source="SUSE CVE"/>
    <description>
    Apache OpenOffice before 4.1.1 allows remote attackers to execute arbitrary commands and possibly have other unspecified impact via a crafted Calc spreadsheet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3524/">CVE-2014-3524</cve>
	<bugzilla href="https://bugzilla.suse.com/893133">SUSE bug 893133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141630" comment="libreoffice-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141631" comment="libreoffice-base-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141632" comment="libreoffice-base-drivers-mysql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141633" comment="libreoffice-base-drivers-postgresql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141634" comment="libreoffice-calc-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141635" comment="libreoffice-calc-extensions-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141636" comment="libreoffice-draw-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141637" comment="libreoffice-filters-optional-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141638" comment="libreoffice-gnome-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141639" comment="libreoffice-icon-theme-tango-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141640" comment="libreoffice-impress-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141641" comment="libreoffice-l10n-af-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141642" comment="libreoffice-l10n-ar-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141643" comment="libreoffice-l10n-ca-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141644" comment="libreoffice-l10n-cs-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141645" comment="libreoffice-l10n-da-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141646" comment="libreoffice-l10n-de-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141647" comment="libreoffice-l10n-en-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141648" comment="libreoffice-l10n-es-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141649" comment="libreoffice-l10n-fi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141650" comment="libreoffice-l10n-fr-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141651" comment="libreoffice-l10n-gu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141652" comment="libreoffice-l10n-hi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141653" comment="libreoffice-l10n-hu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141654" comment="libreoffice-l10n-it-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141655" comment="libreoffice-l10n-ja-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141656" comment="libreoffice-l10n-ko-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141657" comment="libreoffice-l10n-nb-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141658" comment="libreoffice-l10n-nl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141659" comment="libreoffice-l10n-nn-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141660" comment="libreoffice-l10n-pl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141661" comment="libreoffice-l10n-pt-BR-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141662" comment="libreoffice-l10n-pt-PT-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141663" comment="libreoffice-l10n-ru-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141664" comment="libreoffice-l10n-sk-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141665" comment="libreoffice-l10n-sv-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141666" comment="libreoffice-l10n-xh-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141667" comment="libreoffice-l10n-zh-Hans-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141668" comment="libreoffice-l10n-zh-Hant-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141669" comment="libreoffice-l10n-zu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141670" comment="libreoffice-mailmerge-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141671" comment="libreoffice-math-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141672" comment="libreoffice-officebean-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141673" comment="libreoffice-pyuno-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141674" comment="libreoffice-writer-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141675" comment="libreoffice-writer-extensions-4.3.1.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532" source="SUSE CVE"/>
    <description>
    dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532</cve>
	<bugzilla href="https://bugzilla.suse.com/885241">SUSE bug 885241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533" source="SUSE CVE"/>
    <description>
    dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533</cve>
	<bugzilla href="https://bugzilla.suse.com/885241">SUSE bug 885241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3534" ref_url="https://www.suse.com/security/cve/CVE-2014-3534" source="SUSE CVE"/>
    <description>
    arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3534/">CVE-2014-3534</cve>
	<bugzilla href="https://bugzilla.suse.com/885460">SUSE bug 885460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000963.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3540" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3540" ref_url="https://www.suse.com/security/cve/CVE-2014-3540" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-0114.  Reason: This candidate is a duplicate of CVE-2014-0114.  CVE abstraction content decisions did not require a second ID.  Notes: All CVE users should reference CVE-2014-0114 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-15"/>
	<updated date="2022-05-15"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3540/">CVE-2014-3540</cve>
	<bugzilla href="https://bugzilla.suse.com/885963">SUSE bug 885963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1040-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html" source="SUSE-SU"/>
    <description>
    NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/889429">SUSE bug 889429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1039-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00026.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00013.html" source="SUSE-SU"/>
    <description>
    snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141682" comment="libsnmp30-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141683" comment="libsnmp30-32bit-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141684" comment="net-snmp-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141685" comment="perl-SNMP-5.7.2.1-3.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141686" comment="snmp-mibs-5.7.2.1-3.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512467" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512468" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512469" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512470" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512471" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002292.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7015773" ref_url="https://www.suse.com/support/kb/doc?id=7015773" source="SUSE-SU"/>
		<reference ref_id="TID7015777" ref_url="https://www.suse.com/support/kb/doc/?id=7015777" source="SUSE-SU"/>
		<reference ref_id="TID7015785" ref_url="https://www.suse.com/support/kb/doc/?id=7015785" source="SUSE-SU"/>
		<reference ref_id="TID7015793" ref_url="https://www.suse.com/support/kb/doc/?id=7015793" source="SUSE-SU"/>
		<reference ref_id="TID7015804" ref_url="https://www.suse.com/support/kb/doc/?id=7015804" source="SUSE-SU"/>
		<reference ref_id="TID7015805" ref_url="https://www.suse.com/support/kb/doc/?id=7015805" source="SUSE-SU"/>
		<reference ref_id="TID7015809" ref_url="https://www.suse.com/support/kb/doc/?id=7015809" source="SUSE-SU"/>
		<reference ref_id="TID7015826" ref_url="https://www.suse.com/support/kb/doc/?id=7015826" source="SUSE-SU"/>
		<reference ref_id="TID7015854" ref_url="https://www.suse.com/support/kb/doc/?id=7015854" source="SUSE-SU"/>
		<reference ref_id="TID7015987" ref_url="https://www.suse.com/support/kb/doc/?id=7015987" source="SUSE-SU"/>
		<reference ref_id="TID7016067" ref_url="https://www.suse.com/support/kb/doc/?id=7016067" source="SUSE-SU"/>
		<reference ref_id="TID7016068" ref_url="https://www.suse.com/support/kb/doc/?id=7016068" source="SUSE-SU"/>
		<reference ref_id="TID7016144" ref_url="https://www.suse.com/support/kb/doc/?id=7016144" source="SUSE-SU"/>
		<reference ref_id="TID7016205" ref_url="https://www.suse.com/support/kb/doc/?id=7016205" source="SUSE-SU"/>
		<reference ref_id="TID7016299" ref_url="https://www.suse.com/support/kb/doc?id=7016299" source="SUSE-SU"/>
		<reference ref_id="TID7016328" ref_url="https://www.suse.com/support/kb/doc/?id=7016328" source="SUSE-SU"/>
		<reference ref_id="TID7016351" ref_url="https://www.suse.com/support/kb/doc/?id=7016351" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021975" ref_url="https://www.suse.com/support/kb/doc/?id=7021975" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1384-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1395-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2877-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0980-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031023">SUSE bug 1031023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901254">SUSE bug 901254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901757">SUSE bug 901757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901759">SUSE bug 901759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901889">SUSE bug 901889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901968">SUSE bug 901968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902229">SUSE bug 902229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902233">SUSE bug 902233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902476">SUSE bug 902476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903405">SUSE bug 903405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903684">SUSE bug 903684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561580" comment="PackageKit-0.8.16-11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561581" comment="PackageKit-backend-zypp-0.8.16-11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561582" comment="PackageKit-gstreamer-plugin-0.8.16-11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561583" comment="PackageKit-lang-0.8.16-11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514887" comment="evolution-data-server-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514888" comment="evolution-data-server-lang-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561584" comment="gnome-packagekit-3.10.1-8.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561585" comment="gnome-packagekit-lang-3.10.1-8.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514889" comment="libcamel-1_2-45-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514890" comment="libcamel-1_2-45-32bit-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514891" comment="libebackend-1_2-7-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514892" comment="libebackend-1_2-7-32bit-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514893" comment="libebook-1_2-14-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514894" comment="libebook-1_2-14-32bit-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514895" comment="libebook-contacts-1_2-0-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514896" comment="libebook-contacts-1_2-0-32bit-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514897" comment="libecal-1_2-16-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514898" comment="libecal-1_2-16-32bit-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514899" comment="libedata-book-1_2-20-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514900" comment="libedata-book-1_2-20-32bit-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514901" comment="libedata-cal-1_2-23-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514902" comment="libedata-cal-1_2-23-32bit-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514903" comment="libedataserver-1_2-18-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514904" comment="libedataserver-1_2-18-32bit-3.10.4-5.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514517" comment="libopenssl0_9_8-0.9.8j-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514518" comment="libopenssl0_9_8-32bit-0.9.8j-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514519" comment="libopenssl1_0_0-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514520" comment="libopenssl1_0_0-32bit-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561586" comment="libpackagekit-glib2-16-0.8.16-11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561587" comment="libsolv-tools-0.6.11-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561588" comment="libyui-ncurses-pkg6-2.46.1-3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561589" comment="libyui-qt-pkg6-2.44.7-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561590" comment="libzypp-14.39.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514521" comment="openssl-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561591" comment="python-solv-0.6.11-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561592" comment="python-zypp-0.6.4-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561593" comment="typelib-1_0-PackageKitGlib-1_0-0.8.16-11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561594" comment="yast2-pkg-bindings-3.1.20-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561595" comment="zypper-1.11.32-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561596" comment="zypper-log-1.11.32-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514517" comment="libopenssl0_9_8-0.9.8j-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514518" comment="libopenssl0_9_8-32bit-0.9.8j-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514519" comment="libopenssl1_0_0-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514520" comment="libopenssl1_0_0-32bit-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514521" comment="openssl-1.0.1i-9.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514517" comment="libopenssl0_9_8-0.9.8j-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514518" comment="libopenssl0_9_8-32bit-0.9.8j-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514519" comment="libopenssl1_0_0-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514520" comment="libopenssl1_0_0-32bit-1.0.1i-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514521" comment="openssl-1.0.1i-9.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="TID7016027" ref_url="https://www.suse.com/support/kb/doc/?id=7016027" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling.  NOTE: this issue became relevant after the CVE-2014-3568 fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515125" comment="libopenssl0_9_8-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515126" comment="libopenssl0_9_8-32bit-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514984" comment="libopenssl1_0_0-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514985" comment="libopenssl1_0_0-32bit-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514986" comment="openssl-1.0.1i-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515125" comment="libopenssl0_9_8-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515126" comment="libopenssl0_9_8-32bit-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514984" comment="libopenssl1_0_0-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514985" comment="libopenssl1_0_0-32bit-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514986" comment="openssl-1.0.1i-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515125" comment="libopenssl0_9_8-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515126" comment="libopenssl0_9_8-32bit-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514984" comment="libopenssl1_0_0-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514985" comment="libopenssl1_0_0-32bit-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514986" comment="openssl-1.0.1i-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00018.html" source="SUSE-SU"/>
    <description>
    The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow remote attackers to embed arbitrary data into documents via crafted OLE objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<bugzilla href="https://bugzilla.suse.com/893141">SUSE bug 893141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141630" comment="libreoffice-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141631" comment="libreoffice-base-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141632" comment="libreoffice-base-drivers-mysql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141633" comment="libreoffice-base-drivers-postgresql-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141634" comment="libreoffice-calc-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141635" comment="libreoffice-calc-extensions-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141636" comment="libreoffice-draw-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141637" comment="libreoffice-filters-optional-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141638" comment="libreoffice-gnome-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141639" comment="libreoffice-icon-theme-tango-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141640" comment="libreoffice-impress-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141641" comment="libreoffice-l10n-af-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141642" comment="libreoffice-l10n-ar-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141643" comment="libreoffice-l10n-ca-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141644" comment="libreoffice-l10n-cs-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141645" comment="libreoffice-l10n-da-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141646" comment="libreoffice-l10n-de-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141647" comment="libreoffice-l10n-en-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141648" comment="libreoffice-l10n-es-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141649" comment="libreoffice-l10n-fi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141650" comment="libreoffice-l10n-fr-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141651" comment="libreoffice-l10n-gu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141652" comment="libreoffice-l10n-hi-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141653" comment="libreoffice-l10n-hu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141654" comment="libreoffice-l10n-it-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141655" comment="libreoffice-l10n-ja-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141656" comment="libreoffice-l10n-ko-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141657" comment="libreoffice-l10n-nb-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141658" comment="libreoffice-l10n-nl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141659" comment="libreoffice-l10n-nn-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141660" comment="libreoffice-l10n-pl-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141661" comment="libreoffice-l10n-pt-BR-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141662" comment="libreoffice-l10n-pt-PT-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141663" comment="libreoffice-l10n-ru-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141664" comment="libreoffice-l10n-sk-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141665" comment="libreoffice-l10n-sv-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141666" comment="libreoffice-l10n-xh-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141667" comment="libreoffice-l10n-zh-Hans-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141668" comment="libreoffice-l10n-zh-Hant-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141669" comment="libreoffice-l10n-zu-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141670" comment="libreoffice-mailmerge-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141671" comment="libreoffice-math-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141672" comment="libreoffice-officebean-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141673" comment="libreoffice-pyuno-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141674" comment="libreoffice-writer-4.3.1.2-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141675" comment="libreoffice-writer-extensions-4.3.1.2-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949135">SUSE bug 949135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114243" comment="libgcrypt20-1.6.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114244" comment="libgcrypt20-32bit-1.6.1-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156955" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156956" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512320" comment="libgcrypt20-1.6.1-16.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512321" comment="libgcrypt20-32bit-1.6.1-16.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514794" comment="libgcrypt20-1.6.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514795" comment="libgcrypt20-32bit-1.6.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333951" comment="gpg2 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601</cve>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
    <description>
    Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898303">SUSE bug 898303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141775" comment="procmail-3.22-267.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169961" comment="procmail-3.22-269.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620</cve>
	<bugzilla href="https://bugzilla.suse.com/1199221">SUSE bug 1199221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895991">SUSE bug 895991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1290-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1293-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1297-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1298-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" source="SUSE-SU"/>
    <description>
    rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142058" comment="rsyslog-8.4.0-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159295" comment="rsyslog-8.24.0-1.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512617" comment="rsyslog-8.24.0-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514447" comment="rsyslog-8.4.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904017">SUSE bug 904017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514387" comment="dbus-1-1.8.12-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514388" comment="dbus-1-x11-1.8.12-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514389" comment="libdbus-1-3-1.8.12-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514390" comment="libdbus-1-3-32bit-1.8.12-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903055">SUSE bug 903055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903055">SUSE bug 903055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647</cve>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134834">SUSE bug 1134834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1290-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1293-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515009" comment="libvirt-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515010" comment="libvirt-client-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515011" comment="libvirt-client-32bit-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515012" comment="libvirt-daemon-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515013" comment="libvirt-daemon-config-network-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515014" comment="libvirt-daemon-config-nwfilter-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515015" comment="libvirt-daemon-driver-interface-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515016" comment="libvirt-daemon-driver-libxl-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515017" comment="libvirt-daemon-driver-lxc-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515018" comment="libvirt-daemon-driver-network-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515019" comment="libvirt-daemon-driver-nodedev-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515020" comment="libvirt-daemon-driver-nwfilter-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515021" comment="libvirt-daemon-driver-qemu-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515022" comment="libvirt-daemon-driver-secret-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515023" comment="libvirt-daemon-driver-storage-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515024" comment="libvirt-daemon-lxc-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515025" comment="libvirt-daemon-qemu-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515026" comment="libvirt-daemon-xen-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515027" comment="libvirt-doc-1.2.5-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001142.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1330-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514528" comment="libxml2-2-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514529" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514530" comment="libxml2-tools-2.9.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514531" comment="python-libxml2-2.9.1-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673</cve>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141125" comment="shim-0.9-20.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141803" comment="shim-0.7-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142059" comment="shim-0.9-2.14 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159306" comment="shim-0.9-23.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141125" comment="shim-0.9-20.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141803" comment="shim-0.7-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142059" comment="shim-0.9-2.14 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159306" comment="shim-0.9-23.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141125" comment="shim-0.9-20.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141803" comment="shim-0.7-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142059" comment="shim-0.9-2.14 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159306" comment="shim-0.9-23.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1297-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1298-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142058" comment="rsyslog-8.4.0-8.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159295" comment="rsyslog-8.24.0-1.20 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512617" comment="rsyslog-8.24.0-3.16.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514447" comment="rsyslog-8.4.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1314-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00028.html" source="SUSE-SU"/>
    <description>
    wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514741" comment="wpa_supplicant-2.2-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-13"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687</cve>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2177-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182177-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688</cve>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<bugzilla href="https://bugzilla.suse.com/1189862">SUSE bug 1189862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690</cve>
	<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514956" comment="kernel-default-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514957" comment="kernel-default-devel-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514958" comment="kernel-default-extra-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514959" comment="kernel-devel-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514960" comment="kernel-macros-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514961" comment="kernel-source-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514962" comment="kernel-syms-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514963" comment="kernel-xen-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514964" comment="kernel-xen-devel-3.12.36-38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1412-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1443-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the socket manager of Impress Remote in LibreOffice 4.x before 4.2.7 and 4.3.x before 4.3.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to TCP port 1599.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<bugzilla href="https://bugzilla.suse.com/900214">SUSE bug 900214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514451" comment="libreoffice-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514452" comment="libreoffice-base-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514453" comment="libreoffice-base-drivers-mysql-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514454" comment="libreoffice-base-drivers-postgresql-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514455" comment="libreoffice-calc-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514456" comment="libreoffice-calc-extensions-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514457" comment="libreoffice-draw-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514458" comment="libreoffice-filters-optional-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514459" comment="libreoffice-gnome-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514460" comment="libreoffice-icon-theme-tango-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514461" comment="libreoffice-impress-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514462" comment="libreoffice-l10n-af-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514463" comment="libreoffice-l10n-ar-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514464" comment="libreoffice-l10n-ca-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514465" comment="libreoffice-l10n-cs-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514466" comment="libreoffice-l10n-da-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514467" comment="libreoffice-l10n-de-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514468" comment="libreoffice-l10n-en-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514469" comment="libreoffice-l10n-es-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514470" comment="libreoffice-l10n-fi-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514471" comment="libreoffice-l10n-fr-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514472" comment="libreoffice-l10n-gu-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514473" comment="libreoffice-l10n-hi-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514474" comment="libreoffice-l10n-hu-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514475" comment="libreoffice-l10n-it-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514476" comment="libreoffice-l10n-ja-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514477" comment="libreoffice-l10n-ko-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514478" comment="libreoffice-l10n-nb-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514479" comment="libreoffice-l10n-nl-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514480" comment="libreoffice-l10n-nn-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514481" comment="libreoffice-l10n-pl-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514482" comment="libreoffice-l10n-pt-BR-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514483" comment="libreoffice-l10n-pt-PT-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514484" comment="libreoffice-l10n-ru-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514485" comment="libreoffice-l10n-sk-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514486" comment="libreoffice-l10n-sv-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514487" comment="libreoffice-l10n-xh-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514488" comment="libreoffice-l10n-zh-Hans-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514489" comment="libreoffice-l10n-zh-Hant-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514490" comment="libreoffice-l10n-zu-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514491" comment="libreoffice-mailmerge-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514492" comment="libreoffice-math-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514493" comment="libreoffice-officebean-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514494" comment="libreoffice-pyuno-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514495" comment="libreoffice-writer-4.3.3.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514496" comment="libreoffice-writer-extensions-4.3.3.2-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1397-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" source="SUSE-SU"/>
    <description>
    The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694</cve>
	<bugzilla href="https://bugzilla.suse.com/902495">SUSE bug 902495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1397-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0925-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00013.html" source="SUSE-SU"/>
    <description>
    markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<bugzilla href="https://bugzilla.suse.com/902409">SUSE bug 902409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514368" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514369" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514370" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514371" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514372" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514373" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1397-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0925-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00013.html" source="SUSE-SU"/>
    <description>
    nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<bugzilla href="https://bugzilla.suse.com/902410">SUSE bug 902410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514368" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514369" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514370" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514371" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514372" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514373" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3697" ref_url="https://www.suse.com/security/cve/CVE-2014-3697" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1397-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" source="SUSE-SU"/>
    <description>
    Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3697/">CVE-2014-3697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1397-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0925-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00013.html" source="SUSE-SU"/>
    <description>
    The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<bugzilla href="https://bugzilla.suse.com/902408">SUSE bug 902408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514368" comment="finch-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514369" comment="libpurple-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514370" comment="libpurple-lang-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514371" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514372" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514373" comment="pidgin-2.10.9-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" source="SUSE-SU"/>
    <description>
    The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514791" comment="curl-7.37.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514792" comment="libcurl4-7.37.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514793" comment="libcurl4-32bit-7.37.0-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1516-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00113.html" source="SUSE-SU"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512122" comment="file-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512123" comment="file-magic-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512124" comment="libmagic1-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512125" comment="libmagic1-32bit-5.22-10.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514524" comment="file-5.19-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514525" comment="file-magic-5.19-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514526" comment="libmagic1-5.19-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514527" comment="libmagic1-32bit-5.19-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3775" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0742-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00004.html" source="SUSE-SU"/>
    <description>
    libgadu before 1.11.4 and 1.12.0 before 1.12.0-rc3, as used in Pidgin and other products, allows remote Gadu-Gadu file relay servers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775</cve>
	<bugzilla href="https://bugzilla.suse.com/878540">SUSE bug 878540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917</cve>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3940" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3940" ref_url="https://www.suse.com/security/cve/CVE-2014-3940" source="SUSE CVE"/>
    <description>
    The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition via numa_maps read operations during hugepage migration, related to fs/proc/task_mmu.c and mm/mempolicy.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3940/">CVE-2014-3940</cve>
	<bugzilla href="https://bugzilla.suse.com/881101">SUSE bug 881101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0946-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140915" comment="libpulse-mainloop-glib0-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140916" comment="libpulse-mainloop-glib0-32bit-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140917" comment="libpulse0-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140918" comment="libpulse0-32bit-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140919" comment="pulseaudio-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140920" comment="pulseaudio-esound-compat-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140921" comment="pulseaudio-gdm-hooks-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140922" comment="pulseaudio-lang-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141601" comment="pulseaudio-module-bluetooth-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141602" comment="pulseaudio-module-gconf-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141603" comment="pulseaudio-module-jack-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141604" comment="pulseaudio-module-lirc-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140923" comment="pulseaudio-module-x11-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140924" comment="pulseaudio-module-zeroconf-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140925" comment="pulseaudio-utils-5.0-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159175" comment="libpulse-mainloop-glib0-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159176" comment="libpulse-mainloop-glib0-32bit-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159177" comment="libpulse0-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159178" comment="libpulse0-32bit-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159179" comment="pulseaudio-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159180" comment="pulseaudio-esound-compat-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159181" comment="pulseaudio-gdm-hooks-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159182" comment="pulseaudio-lang-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159652" comment="pulseaudio-module-bluetooth-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159653" comment="pulseaudio-module-gconf-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159654" comment="pulseaudio-module-jack-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159655" comment="pulseaudio-module-lirc-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159183" comment="pulseaudio-module-x11-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159184" comment="pulseaudio-module-zeroconf-5.0-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159185" comment="pulseaudio-utils-5.0-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00049.html" source="SUSE-SU"/>
    <description>
    The dissect_frame function in epan/dissectors/packet-frame.c in the frame metadissector in Wireshark 1.10.x before 1.10.8 interprets a negative integer as a length value even though it was intended to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020</cve>
	<bugzilla href="https://bugzilla.suse.com/882602">SUSE bug 882602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html" source="SUSE-SU"/>
    <description>
    The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<bugzilla href="https://bugzilla.suse.com/882600">SUSE bug 882600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939797">SUSE bug 939797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4157" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4157" ref_url="https://www.suse.com/security/cve/CVE-2014-4157" source="SUSE CVE"/>
    <description>
    arch/mips/include/asm/thread_info.h in the Linux kernel before 3.14.8 on the MIPS platform does not configure _TIF_SECCOMP checks on the fast system-call path, which allows local users to bypass intended PR_SET_SECCOMP restrictions by executing a crafted application without invoking a trace or audit subsystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4157/">CVE-2014-4157</cve>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994755">SUSE bug 994755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4216" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4223" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-2483.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4264" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4266" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Serviceability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4268" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4274" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<bugzilla href="https://bugzilla.suse.com/857678">SUSE bug 857678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896400">SUSE bug 896400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4287" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4322" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4322" ref_url="https://www.suse.com/security/cve/CVE-2014-4322" source="SUSE CVE"/>
    <description>
    drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-06"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4322/">CVE-2014-4322</cve>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994751">SUSE bug 994751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4336" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336" source="SUSE CVE"/>
    <description>
    The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883543">SUSE bug 883543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337" source="SUSE CVE"/>
    <description>
    The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883543">SUSE bug 883543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338" source="SUSE CVE"/>
    <description>
    cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883536">SUSE bug 883536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1043-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0932-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00034.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141561" comment="liblzo2-2-2.08-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run.  NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608</cve>
	<bugzilla href="https://bugzilla.suse.com/883948">SUSE bug 883948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4611" ref_url="https://www.suse.com/security/cve/CVE-2014-4611" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation, a different vulnerability than CVE-2014-4715.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4611/">CVE-2014-4611</cve>
	<bugzilla href="https://bugzilla.suse.com/883949">SUSE bug 883949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885389">SUSE bug 885389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000911.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0866-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0952-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00042.html" source="SUSE-SU"/>
    <description>
    The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962098">SUSE bug 962098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141412" comment="gpg2-2.0.24-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141413" comment="gpg2-lang-2.0.24-1.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159008" comment="gpg2-2.0.24-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159009" comment="gpg2-lang-2.0.24-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512180" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512181" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1042-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1046-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1070-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159274" comment="python3-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159275" comment="python3-curses-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512601" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512602" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514863" comment="libpython2_7-1_0-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514864" comment="libpython2_7-1_0-32bit-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514865" comment="python-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514866" comment="python-base-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514867" comment="python-curses-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514868" comment="python-devel-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514869" comment="python-tk-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514870" comment="python-xml-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4671" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699</cve>
	<bugzilla href="https://bugzilla.suse.com/885725">SUSE bug 885725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1366-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102008" comment="wget-1.14-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514448" comment="wget-1.14-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4910" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910" source="SUSE CVE"/>
    <description>
    Directory traversal vulnerability in tools/backlight_helper.c in X.Org xf86-video-intel 2.99.911 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the interface name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141165" comment="xf86-video-intel-2.99.917.641_ge4ef6e9-12.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141833" comment="xf86-video-intel-2.99.914-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142068" comment="xf86-video-intel-2.99.914-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159323" comment="xf86-video-intel-2.99.917.770_gcb6ba2da-1.23 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512632" comment="xf86-video-intel-2.99.917+git781.c8990575-1.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975</cve>
	<bugzilla href="https://bugzilla.suse.com/887877">SUSE bug 887877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517305" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517306" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517307" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in libgfortran might allow remote attackers to execute arbitrary code or cause a denial of service (Fortran application crash) via vectors related to array allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<bugzilla href="https://bugzilla.suse.com/888791">SUSE bug 888791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115214" comment="cpp48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115215" comment="gcc48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115258" comment="gcc48-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115217" comment="gcc48-c++-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115239" comment="gcc48-gij-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115238" comment="gcc48-gij-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115219" comment="gcc48-info-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115224" comment="libasan0-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115263" comment="libasan0-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115242" comment="libgcj48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115241" comment="libgcj48-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115245" comment="libgcj48-jar-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115246" comment="libgcj_bc1-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115232" comment="libstdc++48-devel-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115271" comment="libstdc++48-devel-32bit-4.8.5-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142081" comment="gcc48-gij-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142082" comment="gcc48-gij-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142083" comment="libgcj48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142084" comment="libgcj48-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142085" comment="libgcj48-jar-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142086" comment="libgcj_bc1-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141249" comment="cpp48-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141250" comment="gcc48-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141251" comment="gcc48-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141252" comment="gcc48-c++-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141253" comment="gcc48-gij-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141254" comment="gcc48-gij-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141255" comment="gcc48-info-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141256" comment="libasan0-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141257" comment="libasan0-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141258" comment="libatomic1-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141259" comment="libatomic1-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141260" comment="libffi4-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141261" comment="libffi4-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141262" comment="libgcc_s1-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141263" comment="libgcc_s1-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141264" comment="libgcj48-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141265" comment="libgcj48-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141266" comment="libgcj48-jar-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141267" comment="libgcj_bc1-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141268" comment="libgfortran3-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141269" comment="libgomp1-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141270" comment="libgomp1-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141271" comment="libitm1-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141272" comment="libitm1-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141273" comment="libquadmath0-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141274" comment="libstdc++48-devel-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141275" comment="libstdc++48-devel-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141276" comment="libstdc++6-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141277" comment="libstdc++6-32bit-4.8.3+r212056-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141278" comment="libtsan0-4.8.3+r212056-6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512070" comment="cpp48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512071" comment="gcc48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512072" comment="gcc48-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512073" comment="gcc48-c++-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512074" comment="gcc48-gij-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512075" comment="gcc48-gij-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512076" comment="gcc48-info-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512077" comment="libasan0-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512078" comment="libasan0-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512079" comment="libgcj48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512080" comment="libgcj48-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512081" comment="libgcj48-jar-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512082" comment="libgcj_bc1-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512083" comment="libstdc++48-devel-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512084" comment="libstdc++48-devel-32bit-4.8.5-31.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5045" ref_url="https://www.suse.com/security/cve/CVE-2014-5045" source="SUSE CVE"/>
    <description>
    The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5045/">CVE-2014-5045</cve>
	<bugzilla href="https://bugzilla.suse.com/889060">SUSE bug 889060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
    <description>
    The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<bugzilla href="https://bugzilla.suse.com/886831">SUSE bug 886831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890765">SUSE bug 890765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146</cve>
	<bugzilla href="https://bugzilla.suse.com/889526">SUSE bug 889526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149</cve>
	<bugzilla href="https://bugzilla.suse.com/889526">SUSE bug 889526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The dissect_log function in plugins/irda/packet-irda.c in the IrDA dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889901">SUSE bug 889901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889901">SUSE bug 889901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The APN decode functionality in (1) epan/dissectors/packet-gtp.c and (2) epan/dissectors/packet-gsm_a_gm.c in the GTP and GSM Management dissectors in Wireshark 1.10.x before 1.10.9 does not completely initialize a certain buffer, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889906">SUSE bug 889906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889900">SUSE bug 889900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.10.x before 1.10.9 does not properly validate padding values, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889899">SUSE bug 889899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5206" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5206" ref_url="https://www.suse.com/security/cve/CVE-2014-5206" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a "mount -o remount" command within a user namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5206/">CVE-2014-5206</cve>
	<bugzilla href="https://bugzilla.suse.com/891689">SUSE bug 891689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5207" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5207" ref_url="https://www.suse.com/security/cve/CVE-2014-5207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    fs/namespace.c in the Linux kernel through 3.16.1 does not properly restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing MNT_ATIME_MASK during a remount of a bind mount, which allows local users to gain privileges, interfere with backups and auditing on systems that had atime enabled, or cause a denial of service (excessive filesystem updating) on systems that had atime disabled via a "mount -o remount" command within a user namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5207/">CVE-2014-5207</cve>
	<bugzilla href="https://bugzilla.suse.com/891689">SUSE bug 891689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5209" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5209" ref_url="https://www.suse.com/security/cve/CVE-2014-5209" source="SUSE CVE"/>
    <description>
    An Information Disclosure vulnerability exists in NTP 4.2.7p25 private (mode 6/7) messages via a GET_RESTRICT control message, which could let a malicious user obtain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5209/">CVE-2014-5209</cve>
	<bugzilla href="https://bugzilla.suse.com/1160447">SUSE bug 1160447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338821" comment="ntp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5220" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5220" ref_url="https://www.suse.com/security/cve/CVE-2014-5220" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5220/">CVE-2014-5220</cve>
	<bugzilla href="https://bugzilla.suse.com/910500">SUSE bug 910500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338872" comment="mdadm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515085" comment="krb5-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515086" comment="krb5-32bit-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515087" comment="krb5-client-1.12.1-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515085" comment="krb5-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515086" comment="krb5-32bit-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515087" comment="krb5-client-1.12.1-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1145-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461</cve>
	<bugzilla href="https://bugzilla.suse.com/893824">SUSE bug 893824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140879" comment="liblua5_2-5.2.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140881" comment="lua-5.2.2-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159160" comment="liblua5_2-5.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159162" comment="lua-5.2.4-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001214.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<bugzilla href="https://bugzilla.suse.com/894553">SUSE bug 894553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515301" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515302" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibVNCServer 0.9.9 and earlier does not check certain malloc return values, which allows remote VNC servers to cause a denial of service (application crash) or possibly execute arbitrary code by specifying a large screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3) PalmVNCReSizeFrameBuffer message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515301" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515302" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515301" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515302" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515301" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515302" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515301" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515302" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6268" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268" source="SUSE CVE"/>
    <description>
    The evtchn_fifo_set_pending function in Xen 4.4.x allows local guest users to cause a denial of service (host crash) via vectors involving an uninitialized FIFO-based event channel control block when (1) binding or (2) moving an event to a different VCPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268</cve>
	<bugzilla href="https://bugzilla.suse.com/895804">SUSE bug 895804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015693" ref_url="https://www.suse.com/support/kb/doc/?id=7015693" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015731" ref_url="https://www.suse.com/support/kb/doc?id=7015731" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142078" comment="bash-lang-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141221" comment="bash-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141222" comment="bash-doc-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141223" comment="bash-lang-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141224" comment="libreadline6-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141225" comment="libreadline6-32bit-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141226" comment="readline-doc-6.2-75.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155548" comment="bash-lang-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00070.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943011">SUSE bug 943011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947373">SUSE bug 947373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140839" comment="libevent-2_0-5-2.0.21-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170043" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015714" ref_url="https://www.suse.com/support/kb/doc?id=7015714" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2961-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00001.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142078" comment="bash-lang-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155548" comment="bash-lang-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516642" comment="bash-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516643" comment="bash-doc-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516644" comment="bash-lang-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516645" comment="libreadline6-6.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516646" comment="libreadline6-32bit-6.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516647" comment="readline-doc-6.2-82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015714" ref_url="https://www.suse.com/support/kb/doc?id=7015714" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2961-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00001.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142078" comment="bash-lang-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155548" comment="bash-lang-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516642" comment="bash-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516643" comment="bash-doc-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516644" comment="bash-lang-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516645" comment="libreadline6-6.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516646" comment="libreadline6-32bit-6.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516647" comment="readline-doc-6.2-82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6438" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6438" ref_url="https://www.suse.com/security/cve/CVE-2014-6438" source="SUSE CVE"/>
    <description>
    The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6438/">CVE-2014-6438</cve>
	<bugzilla href="https://bugzilla.suse.com/937962">SUSE bug 937962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6474" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6478" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect integrity and availability via vectors related to SERVER:SP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6495" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, and 7u67, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and Jrockit R27.8.3 and R28.3.3 allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6520" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6530" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6591.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6585.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit 27.8.4 and 28.3.4 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015693" ref_url="https://www.suse.com/support/kb/doc/?id=7015693" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015714" ref_url="https://www.suse.com/support/kb/doc?id=7015714" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015731" ref_url="https://www.suse.com/support/kb/doc?id=7015731" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899266">SUSE bug 899266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902237">SUSE bug 902237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142078" comment="bash-lang-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141221" comment="bash-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141222" comment="bash-doc-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141223" comment="bash-lang-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141224" comment="libreadline6-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141225" comment="libreadline6-32bit-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141226" comment="readline-doc-6.2-75.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155548" comment="bash-lang-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1292-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
    <description>
    Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955182">SUSE bug 955182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514863" comment="libpython2_7-1_0-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514864" comment="libpython2_7-1_0-32bit-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514865" comment="python-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514866" comment="python-base-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514867" comment="python-curses-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514868" comment="python-devel-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514869" comment="python-tk-2.7.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514870" comment="python-xml-2.7.9-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
    <description>
    The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899039">SUSE bug 899039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142078" comment="bash-lang-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141221" comment="bash-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141222" comment="bash-doc-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141223" comment="bash-lang-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141224" comment="libreadline6-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141225" comment="libreadline6-32bit-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141226" comment="readline-doc-6.2-75.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155548" comment="bash-lang-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899039">SUSE bug 899039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142078" comment="bash-lang-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141221" comment="bash-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141222" comment="bash-doc-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141223" comment="bash-lang-4.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141224" comment="libreadline6-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141225" comment="libreadline6-32bit-6.2-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141226" comment="readline-doc-6.2-75.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155548" comment="bash-lang-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7202" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1381-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connection request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202</cve>
	<bugzilla href="https://bugzilla.suse.com/898917">SUSE bug 898917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114236" comment="libzmq3-4.0.4-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141754" comment="libzmq3-4.0.4-2.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142147" comment="libzmq3-4.0.4-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159706" comment="libzmq3-4.0.4-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7203" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1381-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203</cve>
	<bugzilla href="https://bugzilla.suse.com/898917">SUSE bug 898917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114236" comment="libzmq3-4.0.4-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141754" comment="libzmq3-4.0.4-2.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142147" comment="libzmq3-4.0.4-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159706" comment="libzmq3-4.0.4-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7204" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002216.html" source="SUSE-SU"/>
    <description>
    jscript.c in Exuberant Ctags 5.8 allows remote attackers to cause a denial of service (infinite loop and CPU and disk consumption) via a crafted JavaScript file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<bugzilla href="https://bugzilla.suse.com/899486">SUSE bug 899486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130995" comment="ctags-5.8-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516306" comment="ctags-5.8-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7207" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7207" ref_url="https://www.suse.com/security/cve/CVE-2014-7207" source="SUSE CVE"/>
    <description>
    A certain Debian patch to the IPv6 implementation in the Linux kernel 3.2.x through 3.2.63 does not properly validate arguments in ipv6_select_ident function calls, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging (1) tun or (2) macvtap device access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7207/">CVE-2014-7207</cve>
	<bugzilla href="https://bugzilla.suse.com/1139403">SUSE bug 1139403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7283" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7283" ref_url="https://www.suse.com/security/cve/CVE-2014-7283" source="SUSE CVE"/>
    <description>
    The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the xfs implementation in the Linux kernel before 3.14.2 does not properly compare btree hash values, which allows local users to cause a denial of service (filesystem corruption, and OOPS or panic) via operations on directories that have hash collisions, as demonstrated by rmdir operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7283/">CVE-2014-7283</cve>
	<bugzilla href="https://bugzilla.suse.com/899480">SUSE bug 899480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7300" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1348-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00005.html" source="SUSE-SU"/>
    <description>
    GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<bugzilla href="https://bugzilla.suse.com/900031">SUSE bug 900031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107802" comment="gnome-settings-daemon-3.10.2-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107804" comment="gnome-settings-daemon-lang-3.10.2-20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140638" comment="gnome-settings-daemon-3.20.1-40.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140639" comment="gnome-settings-daemon-lang-3.20.1-40.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158999" comment="gnome-settings-daemon-3.20.1-49.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159000" comment="gnome-settings-daemon-lang-3.20.1-49.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512166" comment="gnome-settings-daemon-3.20.1-50.5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512167" comment="gnome-settings-daemon-lang-3.20.1-50.5.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514580" comment="gnome-settings-daemon-3.10.2-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514581" comment="gnome-settings-daemon-lang-3.10.2-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515074" comment="qemu-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515075" comment="qemu-block-curl-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515076" comment="qemu-ipxe-1.0.0-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515077" comment="qemu-kvm-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515078" comment="qemu-seabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515079" comment="qemu-sgabios-8-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515080" comment="qemu-tools-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515081" comment="qemu-vgabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515082" comment="qemu-x86-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514582" comment="glibc-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514583" comment="glibc-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514584" comment="glibc-devel-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514585" comment="glibc-devel-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514586" comment="glibc-i18ndata-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514587" comment="glibc-locale-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514588" comment="glibc-locale-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514589" comment="nscd-2.19-20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822</cve>
	<bugzilla href="https://bugzilla.suse.com/915322">SUSE bug 915322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939240">SUSE bug 939240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1471-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html" source="SUSE-SU"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515009" comment="libvirt-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515010" comment="libvirt-client-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515011" comment="libvirt-client-32bit-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515012" comment="libvirt-daemon-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515013" comment="libvirt-daemon-config-network-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515014" comment="libvirt-daemon-config-nwfilter-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515015" comment="libvirt-daemon-driver-interface-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515016" comment="libvirt-daemon-driver-libxl-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515017" comment="libvirt-daemon-driver-lxc-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515018" comment="libvirt-daemon-driver-network-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515019" comment="libvirt-daemon-driver-nodedev-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515020" comment="libvirt-daemon-driver-nwfilter-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515021" comment="libvirt-daemon-driver-qemu-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515022" comment="libvirt-daemon-driver-secret-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515023" comment="libvirt-daemon-driver-storage-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515024" comment="libvirt-daemon-lxc-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515025" comment="libvirt-daemon-qemu-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515026" comment="libvirt-daemon-xen-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515027" comment="libvirt-doc-1.2.5-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1455-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00078.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<bugzilla href="https://bugzilla.suse.com/904017">SUSE bug 904017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514387" comment="dbus-1-1.8.12-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514388" comment="dbus-1-x11-1.8.12-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514389" comment="libdbus-1-3-1.8.12-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514390" comment="libdbus-1-3-32bit-1.8.12-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826</cve>
	<bugzilla href="https://bugzilla.suse.com/904012">SUSE bug 904012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904013">SUSE bug 904013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515292" comment="qemu-2.0.2-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515293" comment="qemu-block-curl-2.0.2-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515294" comment="qemu-ipxe-1.0.0-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515295" comment="qemu-kvm-2.0.2-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515296" comment="qemu-seabios-1.7.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515297" comment="qemu-sgabios-8-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515298" comment="qemu-tools-2.0.2-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515299" comment="qemu-vgabios-1.7.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515300" comment="qemu-x86-2.0.2-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841</cve>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7843" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7843" ref_url="https://www.suse.com/security/cve/CVE-2014-7843" source="SUSE CVE"/>
    <description>
    The __clear_user function in arch/arm64/lib/clear_user.S in the Linux kernel before 3.17.4 on the ARM64 platform allows local users to cause a denial of service (system crash) by reading one byte beyond a /dev/zero page boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7843/">CVE-2014-7843</cve>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994751">SUSE bug 994751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994752">SUSE bug 994752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00097.html" source="SUSE-SU"/>
    <description>
    BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142038" comment="mailx-12.5-25.15 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514381" comment="mailx-12.5-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970</cve>
	<bugzilla href="https://bugzilla.suse.com/900644">SUSE bug 900644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7975" ref_url="https://www.suse.com/security/cve/CVE-2014-7975" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7975/">CVE-2014-7975</cve>
	<bugzilla href="https://bugzilla.suse.com/900392">SUSE bug 900392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<bugzilla href="https://bugzilla.suse.com/902851">SUSE bug 902851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105408" comment="libruby2_1-2_1-2.1.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105409" comment="ruby2.1-2.1.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105414" comment="ruby2.1-stdlib-2.1.2-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140929" comment="libruby2_1-2_1-2.1.2-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140930" comment="ruby2.1-2.1.2-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140931" comment="ruby2.1-stdlib-2.1.2-12.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514835" comment="libruby2_1-2_1-2.1.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514836" comment="ruby2.1-2.1.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514837" comment="ruby2.1-stdlib-2.1.2-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8086" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086</cve>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<bugzilla href="https://bugzilla.suse.com/905326">SUSE bug 905326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105408" comment="libruby2_1-2_1-2.1.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105409" comment="ruby2.1-2.1.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105414" comment="ruby2.1-stdlib-2.1.2-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140929" comment="libruby2_1-2_1-2.1.2-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140930" comment="ruby2.1-2.1.2-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140931" comment="ruby2.1-stdlib-2.1.2-12.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514835" comment="libruby2_1-2_1-2.1.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514836" comment="ruby2.1-2.1.2-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514837" comment="ruby2.1-stdlib-2.1.2-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    X.Org X Window System (aka X11 and X) X11R5 and X.Org Server (aka xserver and xorg-server) before 1.16.3, when using SUN-DES-1 (Secure RPC) authentication credentials, does not check the return value of a malloc call, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a crafted connection request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<bugzilla href="https://bugzilla.suse.com/882226">SUSE bug 882226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<bugzilla href="https://bugzilla.suse.com/1146596">SUSE bug 1146596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514782" comment="xorg-x11-server-7.6_1.15.2-28.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514783" comment="xorg-x11-server-extra-7.6_1.15.2-28.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The XInput extension in X.Org X Window System (aka X11 or X) X11R4 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXChangeDeviceControl, (2) ProcXChangeDeviceControl, (3) ProcXChangeFeedbackControl, (4) ProcXSendExtensionEvent, (5) SProcXIAllowEvents, (6) SProcXIChangeCursor, (7) ProcXIChangeHierarchy, (8) SProcXIGetClientPointer, (9) SProcXIGrabDevice, (10) SProcXIUngrabDevice, (11) ProcXIUngrabDevice, (12) SProcXIPassiveGrabDevice, (13) ProcXIPassiveGrabDevice, (14) SProcXIPassiveUngrabDevice, (15) ProcXIPassiveUngrabDevice, (16) SProcXListDeviceProperties, (17) SProcXDeleteDeviceProperty, (18) SProcXIListProperties, (19) SProcXIDeleteProperty, (20) SProcXIGetProperty, (21) SProcXIQueryDevice, (22) SProcXIQueryPointer, (23) SProcXISelectEvents, (24) SProcXISetClientPointer, (25) SProcXISetFocus, (26) SProcXIGetFocus, or (27) SProcXIWarpPointer function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The DBE extension in X.Org X Window System (aka X11 or X) X11R6.1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcDbeSwapBuffers or (2) SProcDbeSwapBuffers function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) __glXDisp_Render, (2) __glXDisp_RenderLarge, (3) __glXDispSwap_VendorPrivate, (4) __glXDispSwap_VendorPrivateWithReply, (5) set_client_info, (6) __glXDispSwap_SetClientInfoARB, (7) DoSwapInterval, (8) DoGetProgramString, (9) DoGetString, (10) __glXDispSwap_RenderMode, (11) __glXDisp_GetCompressedTexImage, (12) __glXDispSwap_GetCompressedTexImage, (13) __glXDisp_FeedbackBuffer, (14) __glXDispSwap_FeedbackBuffer, (15) __glXDisp_SelectBuffer, (16) __glXDispSwap_SelectBuffer, (17) __glXDisp_Flush, (18) __glXDispSwap_Flush, (19) __glXDisp_Finish, (20) __glXDispSwap_Finish, (21) __glXDisp_ReadPixels, (22) __glXDispSwap_ReadPixels, (23) __glXDisp_GetTexImage, (24) __glXDispSwap_GetTexImage, (25) __glXDisp_GetPolygonStipple, (26) __glXDispSwap_GetPolygonStipple, (27) __glXDisp_GetSeparableFilter, (28) __glXDisp_GetSeparableFilterEXT, (29) __glXDisp_GetConvolutionFilter, (30) __glXDisp_GetConvolutionFilterEXT, (31) __glXDisp_GetHistogram, (32) __glXDisp_GetHistogramEXT, (33) __glXDisp_GetMinmax, (34) __glXDisp_GetMinmaxEXT, (35) __glXDisp_GetColorTable, (36) __glXDisp_GetColorTableSGI, (37) GetSeparableFilter, (38) GetConvolutionFilter, (39) GetHistogram, (40) GetMinmax, or (41) GetColorTable function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The XVideo extension in XFree86 4.0.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXvQueryExtension, (2) SProcXvQueryAdaptors, (3) SProcXvQueryEncodings, (4) SProcXvGrabPort, (5) SProcXvUngrabPort, (6) SProcXvPutVideo, (7) SProcXvPutStill, (8) SProcXvGetVideo, (9) SProcXvGetStill, (10) SProcXvPutImage, (11) SProcXvShmPutImage, (12) SProcXvSelectVideoNotify, (13) SProcXvSelectPortNotify, (14) SProcXvStopVideo, (15) SProcXvSetPortAttribute, (16) SProcXvGetPortAttribute, (17) SProcXvQueryBestSize, (18) SProcXvQueryPortAttributes, (19) SProcXvQueryImageAttributes, or (20) SProcXvListImageFormats function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The Render extension in XFree86 4.0.1, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcRenderQueryVersion, (2) SProcRenderQueryVersion, (3) SProcRenderQueryPictFormats, (4) SProcRenderQueryPictIndexValues, (5) SProcRenderCreatePicture, (6) SProcRenderChangePicture, (7) SProcRenderSetPictureClipRectangles, (8) SProcRenderFreePicture, (9) SProcRenderComposite, (10) SProcRenderScale, (11) SProcRenderCreateGlyphSet, (12) SProcRenderReferenceGlyphSet, (13) SProcRenderFreeGlyphSet, (14) SProcRenderFreeGlyphs, or (15) SProcRenderCompositeGlyphs function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The RandR extension in XFree86 4.2.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcRRQueryVersion, (2) SProcRRGetScreenInfo, (3) SProcRRSelectInput, or (4) SProcRRConfigureOutputProperty function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    X.Org Server (aka xserver and xorg-server) 1.15.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, or (12) sproc_present_query_capabilities function in the (a) DRI3 or (b) Present extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html" source="SUSE-SU"/>
    <description>
    OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141048" comment="openvpn-2.3.8-16.6.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142043" comment="openvpn-2.3.8-16.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514386" comment="openvpn-2.3.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515292" comment="qemu-2.0.2-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515293" comment="qemu-block-curl-2.0.2-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515294" comment="qemu-ipxe-1.0.0-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515295" comment="qemu-kvm-2.0.2-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515296" comment="qemu-seabios-1.7.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515297" comment="qemu-sgabios-8-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515298" comment="qemu-tools-2.0.2-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515299" comment="qemu-vgabios-1.7.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515300" comment="qemu-x86-2.0.2-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1721-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512122" comment="file-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512123" comment="file-magic-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512124" comment="libmagic1-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512125" comment="libmagic1-32bit-5.22-10.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514439" comment="file-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514440" comment="file-magic-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514441" comment="libmagic1-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514442" comment="libmagic1-32bit-5.19-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518307" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518308" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518309" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518310" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1721-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512122" comment="file-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512123" comment="file-magic-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512124" comment="libmagic1-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512125" comment="libmagic1-32bit-5.22-10.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514439" comment="file-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514440" comment="file-magic-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514441" comment="libmagic1-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514442" comment="libmagic1-32bit-5.19-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518307" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518308" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518309" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518310" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1716-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00100.html" source="SUSE-SU"/>
    <description>
    Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105405" comment="rpm-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105404" comment="rpm-32bit-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105406" comment="rpm-build-4.11.2-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141108" comment="rpm-4.11.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141109" comment="rpm-32bit-4.11.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141110" comment="rpm-build-4.11.2-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512613" comment="rpm-4.11.2-16.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512614" comment="rpm-32bit-4.11.2-16.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512615" comment="rpm-build-4.11.2-16.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514922" comment="rpm-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514923" comment="rpm-32bit-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514924" comment="rpm-build-4.11.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514925" comment="rpm-python-4.11.2-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111372" comment="libaugeas0-1.2.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514806" comment="libaugeas0-1.2.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140461" comment="augeas-1.2.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140462" comment="augeas-lenses-1.2.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140463" comment="libaugeas0-1.2.0-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158941" comment="augeas-1.2.0-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158942" comment="augeas-lenses-1.2.0-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158943" comment="libaugeas0-1.2.0-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172798" comment="augeas-1.2.0-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172799" comment="augeas-lenses-1.2.0-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172800" comment="libaugeas0-1.2.0-17.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0955-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00084.html" source="SUSE-SU"/>
    <description>
    DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515117" comment="glibc-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515118" comment="glibc-32bit-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515119" comment="glibc-devel-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515120" comment="glibc-devel-32bit-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515121" comment="glibc-i18ndata-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515122" comment="glibc-locale-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515123" comment="glibc-locale-32bit-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515124" comment="nscd-2.19-22.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514951" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514952" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514951" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514952" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519147" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519148" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514951" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514952" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514951" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514952" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" source="SUSE-SU"/>
    <description>
    The qemu implementation of virConnectGetAllDomainStats in libvirt before 1.2.11 does not properly handle locks when a domain is skipped due to ACL restrictions, which allows a remote authenticated users to cause a denial of service (deadlock or segmentation fault and crash) via a request to access the users does not have privileges to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131</cve>
	<bugzilla href="https://bugzilla.suse.com/909274">SUSE bug 909274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00007.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<bugzilla href="https://bugzilla.suse.com/910790">SUSE bug 910790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928323">SUSE bug 928323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514392" comment="libssh4-0.6.3-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1735-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133</cve>
	<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134</cve>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909078">SUSE bug 909078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8135" ref_url="https://www.suse.com/security/cve/CVE-2014-8135" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" source="SUSE-SU"/>
    <description>
    The storageVolUpload function in storage/storage_driver.c in libvirt before 1.2.11 does not check a certain return value, which allows local users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted offset value in a "virsh vol-upload" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8135/">CVE-2014-8135</cve>
	<bugzilla href="https://bugzilla.suse.com/910860">SUSE bug 910860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" source="SUSE-SU"/>
    <description>
    The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136</cve>
	<bugzilla href="https://bugzilla.suse.com/910862">SUSE bug 910862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515009" comment="libvirt-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515010" comment="libvirt-client-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515011" comment="libvirt-client-32bit-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515012" comment="libvirt-daemon-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515013" comment="libvirt-daemon-config-network-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515014" comment="libvirt-daemon-config-nwfilter-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515015" comment="libvirt-daemon-driver-interface-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515016" comment="libvirt-daemon-driver-libxl-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515017" comment="libvirt-daemon-driver-lxc-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515018" comment="libvirt-daemon-driver-network-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515019" comment="libvirt-daemon-driver-nodedev-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515020" comment="libvirt-daemon-driver-nwfilter-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515021" comment="libvirt-daemon-driver-qemu-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515022" comment="libvirt-daemon-driver-secret-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515023" comment="libvirt-daemon-driver-storage-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515024" comment="libvirt-daemon-lxc-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515025" comment="libvirt-daemon-qemu-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515026" comment="libvirt-daemon-xen-1.2.5-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515027" comment="libvirt-doc-1.2.5-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0039-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0042-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514968" comment="libjasper1-1.900.1-166.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514969" comment="libjasper1-32bit-1.900.1-166.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0217-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514574" comment="unzip-6.00-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514574" comment="unzip-6.00-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514574" comment="unzip-6.00-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
    <description>
    Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<bugzilla href="https://bugzilla.suse.com/914279">SUSE bug 914279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<bugzilla href="https://bugzilla.suse.com/1066493">SUSE bug 1066493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927951">SUSE bug 927951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959178">SUSE bug 959178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515138" comment="apache-commons-logging-1.1.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515139" comment="flute-1.3.0-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515140" comment="libabw-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515141" comment="libbase-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515142" comment="libcdr-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515143" comment="libcmis-0_5-5-0.5.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515144" comment="libe-book-0_1-1-0.1.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515145" comment="libetonyek-0_1-1-0.1.3-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515146" comment="libfonts-1.1.3-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515147" comment="libformula-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515148" comment="libfreehand-0_1-1-0.1.1-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515149" comment="libgltf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515150" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515151" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515152" comment="libhyphen0-2.8.8-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515153" comment="libixion-0_10-0-0.9.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515154" comment="liblangtag1-0.5.7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515155" comment="liblayout-0.2.10-4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515156" comment="libloader-1.1.3-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515157" comment="libmspub-0_1-1-0.1.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515158" comment="libmwaw-0_3-3-0.3.6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515159" comment="libodfgen-0_1-1-0.1.4-3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515160" comment="liborcus-0_8-0-0.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515161" comment="libpagemaker-0_0-0-0.0.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515162" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515163" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515164" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515165" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515166" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515167" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515168" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515169" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515170" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515171" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515172" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515173" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515174" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515175" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515176" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515177" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515178" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515179" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515180" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515181" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515182" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515183" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515184" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515185" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515186" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515187" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515188" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515189" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515190" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515191" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515192" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515193" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515194" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515195" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515196" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515197" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515198" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515199" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515200" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515201" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515202" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515203" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515204" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515205" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515207" comment="libreoffice-voikko-4.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515208" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515209" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515210" comment="librepository-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515211" comment="librevenge-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515212" comment="librevenge-stream-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515213" comment="libserializer-1.1.2-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515214" comment="libvisio-0_1-1-0.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515215" comment="libvoikko1-3.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515216" comment="libwps-0_4-4-0.4.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515217" comment="malaga-suomi-1.18-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515218" comment="myspell-af_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515219" comment="myspell-ar-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515220" comment="myspell-be_BY-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515221" comment="myspell-bg_BG-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515222" comment="myspell-bn_BD-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515223" comment="myspell-bs_BA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515224" comment="myspell-ca-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515225" comment="myspell-cs_CZ-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515226" comment="myspell-da_DK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515227" comment="myspell-de-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515228" comment="myspell-dictionaries-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515229" comment="myspell-el_GR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515230" comment="myspell-en-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515231" comment="myspell-es-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515232" comment="myspell-et_EE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515233" comment="myspell-fr_FR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515234" comment="myspell-gu_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515235" comment="myspell-he_IL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515236" comment="myspell-hi_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515237" comment="myspell-hr_HR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515238" comment="myspell-hu_HU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515239" comment="myspell-it_IT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515240" comment="myspell-lo_LA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515241" comment="myspell-lt_LT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515242" comment="myspell-lv_LV-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515243" comment="myspell-nl_NL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515244" comment="myspell-no-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515245" comment="myspell-pl_PL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515246" comment="myspell-pt_BR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515247" comment="myspell-pt_PT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515248" comment="myspell-ro-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515249" comment="myspell-ru_RU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515250" comment="myspell-sk_SK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515251" comment="myspell-sl_SI-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515252" comment="myspell-sr-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515253" comment="myspell-sv_SE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515254" comment="myspell-te_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515255" comment="myspell-th_TH-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515256" comment="myspell-vi-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515257" comment="myspell-zu_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515258" comment="pentaho-libxml-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515259" comment="pentaho-reporting-flow-engine-0.9.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515260" comment="sac-1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518046" comment="icu-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518047" comment="libicu52_1-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518048" comment="libicu52_1-32bit-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518049" comment="libicu52_1-data-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8147" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<bugzilla href="https://bugzilla.suse.com/1066493">SUSE bug 1066493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079317">SUSE bug 1079317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910806">SUSE bug 910806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927951">SUSE bug 927951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959178">SUSE bug 959178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515138" comment="apache-commons-logging-1.1.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515139" comment="flute-1.3.0-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515140" comment="libabw-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515141" comment="libbase-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515142" comment="libcdr-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515143" comment="libcmis-0_5-5-0.5.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515144" comment="libe-book-0_1-1-0.1.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515145" comment="libetonyek-0_1-1-0.1.3-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515146" comment="libfonts-1.1.3-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515147" comment="libformula-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515148" comment="libfreehand-0_1-1-0.1.1-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515149" comment="libgltf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515150" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515151" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515152" comment="libhyphen0-2.8.8-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515153" comment="libixion-0_10-0-0.9.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515154" comment="liblangtag1-0.5.7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515155" comment="liblayout-0.2.10-4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515156" comment="libloader-1.1.3-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515157" comment="libmspub-0_1-1-0.1.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515158" comment="libmwaw-0_3-3-0.3.6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515159" comment="libodfgen-0_1-1-0.1.4-3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515160" comment="liborcus-0_8-0-0.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515161" comment="libpagemaker-0_0-0-0.0.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515162" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515163" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515164" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515165" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515166" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515167" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515168" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515169" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515170" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515171" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515172" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515173" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515174" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515175" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515176" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515177" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515178" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515179" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515180" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515181" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515182" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515183" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515184" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515185" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515186" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515187" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515188" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515189" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515190" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515191" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515192" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515193" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515194" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515195" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515196" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515197" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515198" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515199" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515200" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515201" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515202" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515203" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515204" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515205" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515207" comment="libreoffice-voikko-4.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515208" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515209" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515210" comment="librepository-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515211" comment="librevenge-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515212" comment="librevenge-stream-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515213" comment="libserializer-1.1.2-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515214" comment="libvisio-0_1-1-0.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515215" comment="libvoikko1-3.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515216" comment="libwps-0_4-4-0.4.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515217" comment="malaga-suomi-1.18-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515218" comment="myspell-af_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515219" comment="myspell-ar-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515220" comment="myspell-be_BY-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515221" comment="myspell-bg_BG-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515222" comment="myspell-bn_BD-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515223" comment="myspell-bs_BA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515224" comment="myspell-ca-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515225" comment="myspell-cs_CZ-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515226" comment="myspell-da_DK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515227" comment="myspell-de-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515228" comment="myspell-dictionaries-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515229" comment="myspell-el_GR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515230" comment="myspell-en-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515231" comment="myspell-es-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515232" comment="myspell-et_EE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515233" comment="myspell-fr_FR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515234" comment="myspell-gu_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515235" comment="myspell-he_IL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515236" comment="myspell-hi_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515237" comment="myspell-hr_HR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515238" comment="myspell-hu_HU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515239" comment="myspell-it_IT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515240" comment="myspell-lo_LA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515241" comment="myspell-lt_LT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515242" comment="myspell-lv_LV-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515243" comment="myspell-nl_NL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515244" comment="myspell-no-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515245" comment="myspell-pl_PL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515246" comment="myspell-pt_BR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515247" comment="myspell-pt_PT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515248" comment="myspell-ro-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515249" comment="myspell-ru_RU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515250" comment="myspell-sk_SK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515251" comment="myspell-sl_SI-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515252" comment="myspell-sr-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515253" comment="myspell-sv_SE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515254" comment="myspell-te_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515255" comment="myspell-th_TH-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515256" comment="myspell-vi-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515257" comment="myspell-zu_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515258" comment="pentaho-libxml-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515259" comment="pentaho-reporting-flow-engine-0.9.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515260" comment="sac-1.3-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518046" comment="icu-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518047" comment="libicu52_1-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518048" comment="libicu52_1-32bit-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518049" comment="libicu52_1-data-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8148" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00051.html" source="SUSE-SU"/>
    <description>
    The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<bugzilla href="https://bugzilla.suse.com/912023">SUSE bug 912023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514791" comment="curl-7.37.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514792" comment="libcurl4-7.37.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514793" comment="libcurl4-32bit-7.37.0-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8151" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8151" ref_url="https://www.suse.com/security/cve/CVE-2014-8151" source="SUSE CVE"/>
    <description>
    The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8151/">CVE-2014-8151</cve>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911666">SUSE bug 911666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8155" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8155" ref_url="https://www.suse.com/security/cve/CVE-2014-8155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8155/">CVE-2014-8155</cve>
	<bugzilla href="https://bugzilla.suse.com/920366">SUSE bug 920366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001223.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0200-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515083" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515084" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0200-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515083" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515084" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939241">SUSE bug 939241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="TID7016668" ref_url="https://www.suse.com/support/kb/doc?id=7016668" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160</cve>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514570" comment="libecpg6-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514571" comment="libpq5-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514572" comment="libpq5-32bit-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514573" comment="postgresql93-9.3.6-5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8169" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001428.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0475-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" source="SUSE-SU"/>
    <description>
    automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<bugzilla href="https://bugzilla.suse.com/917977">SUSE bug 917977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110200" comment="autofs-5.0.9-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140464" comment="autofs-5.0.9-21.6 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158944" comment="autofs-5.0.9-27.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512032" comment="autofs-5.0.9-28.3.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514745" comment="autofs-5.0.9-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8181" ref_url="https://www.suse.com/security/cve/CVE-2014-8181" source="SUSE CVE"/>
    <description>
    The kernel in Red Hat Enterprise Linux 7 and MRG-2 does not clear garbage data for SG_IO buffer, which may leaking sensitive information to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8181/">CVE-2014-8181</cve>
	<bugzilla href="https://bugzilla.suse.com/980851">SUSE bug 980851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8182" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8182" ref_url="https://www.suse.com/security/cve/CVE-2014-8182" source="SUSE CVE"/>
    <description>
    An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8182/">CVE-2014-8182</cve>
	<bugzilla href="https://bugzilla.suse.com/998096">SUSE bug 998096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336726" comment="openldap2-client is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001100.html" source="SUSE-SU"/>
    <description>
    Integer overflow in TigerVNC allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to screen size handling, which triggers a heap-based buffer overflow, a similar issue to CVE-2014-6051.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140770" comment="libXvnc1-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140771" comment="tigervnc-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140772" comment="xorg-x11-Xvnc-1.6.0-12.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142062" comment="tigervnc-1.4.3-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142063" comment="xorg-x11-Xvnc-1.4.3-7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154696" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154697" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154698" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512241" comment="libXvnc1-1.6.0-18.23.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512242" comment="tigervnc-1.6.0-18.23.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512243" comment="xorg-x11-Xvnc-1.6.0-18.23.72 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514361" comment="tigervnc-1.3.0-22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514362" comment="xorg-x11-Xvnc-1.3.0-22.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1752-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00034.html" source="SUSE-SU"/>
    <description>
    librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922710">SUSE bug 922710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515701" comment="rsync-3.1.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515125" comment="libopenssl0_9_8-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515126" comment="libopenssl0_9_8-32bit-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514984" comment="libopenssl1_0_0-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514985" comment="libopenssl1_0_0-32bit-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514986" comment="openssl-1.0.1i-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    The HorizontalFilter function in resize.c in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514363" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514364" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514365" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514366" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514367" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    PCX parser code in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514363" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514364" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514365" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514366" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514367" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8369" ref_url="https://www.suse.com/security/cve/CVE-2014-8369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8369/">CVE-2014-8369</cve>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8437" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8437" ref_url="https://www.suse.com/security/cve/CVE-2014-8437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow remote attackers to discover session tokens via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8437/">CVE-2014-8437</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8438" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8438" ref_url="https://www.suse.com/security/cve/CVE-2014-8438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0573 and CVE-2014-0588.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8438/">CVE-2014-8438</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8439" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8439" ref_url="https://www.suse.com/security/cve/CVE-2014-8439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00004.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.258 and 14.x and 15.x before 15.0.0.239 on Windows and OS X and before 11.2.202.424 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK &amp; Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8439/">CVE-2014-8439</cve>
	<bugzilla href="https://bugzilla.suse.com/907257">SUSE bug 907257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514522" comment="flash-player-11.2.202.424-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514523" comment="flash-player-gnome-11.2.202.424-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8440" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8440" ref_url="https://www.suse.com/security/cve/CVE-2014-8440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8441.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8440/">CVE-2014-8440</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8441" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8441" ref_url="https://www.suse.com/security/cve/CVE-2014-8441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8440.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8441/">CVE-2014-8441</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8442" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8442" ref_url="https://www.suse.com/security/cve/CVE-2014-8442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to complete a transition from Low Integrity to Medium Integrity by leveraging incorrect permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8442/">CVE-2014-8442</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8443" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8443" ref_url="https://www.suse.com/security/cve/CVE-2014-8443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8443/">CVE-2014-8443</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514377" comment="flash-player-11.2.202.425-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514378" comment="flash-player-gnome-11.2.202.425-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0011-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514856" comment="bind-libs-9.9.5P1-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514857" comment="bind-libs-32bit-9.9.5P1-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514858" comment="bind-utils-9.9.5P1-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559</cve>
	<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8561" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8561" ref_url="https://www.suse.com/security/cve/CVE-2014-8561" source="SUSE CVE"/>
    <description>
    imagemagick 6.8.9.6 has remote DOS via infinite loop
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-8561/">CVE-2014-8561</cve>
	<bugzilla href="https://bugzilla.suse.com/1156786">SUSE bug 1156786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    DCM decode in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514363" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514364" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514365" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514366" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514367" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1472-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html" source="SUSE-SU"/>
    <description>
    The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<bugzilla href="https://bugzilla.suse.com/904603">SUSE bug 904603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514374" comment="gnutls-3.2.15-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514375" comment="libgnutls28-3.2.15-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514376" comment="libgnutls28-32bit-3.2.15-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907649">SUSE bug 907649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514746" comment="MozillaFirefox-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514747" comment="MozillaFirefox-translations-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514748" comment="libfreebl3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514749" comment="libfreebl3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514750" comment="libsoftokn3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514751" comment="libsoftokn3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514752" comment="mozilla-nss-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514753" comment="mozilla-nss-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514754" comment="mozilla-nss-certs-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514755" comment="mozilla-nss-certs-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514756" comment="mozilla-nss-tools-3.17.3-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514746" comment="MozillaFirefox-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514747" comment="MozillaFirefox-translations-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514748" comment="libfreebl3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514749" comment="libfreebl3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514750" comment="libsoftokn3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514751" comment="libsoftokn3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514752" comment="mozilla-nss-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514753" comment="mozilla-nss-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514754" comment="mozilla-nss-certs-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514755" comment="mozilla-nss-certs-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514756" comment="mozilla-nss-tools-3.17.3-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514746" comment="MozillaFirefox-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514747" comment="MozillaFirefox-translations-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514748" comment="libfreebl3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514749" comment="libfreebl3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514750" comment="libsoftokn3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514751" comment="libsoftokn3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514752" comment="mozilla-nss-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514753" comment="mozilla-nss-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514754" comment="mozilla-nss-certs-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514755" comment="mozilla-nss-certs-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514756" comment="mozilla-nss-tools-3.17.3-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514746" comment="MozillaFirefox-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514747" comment="MozillaFirefox-translations-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514748" comment="libfreebl3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514749" comment="libfreebl3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514750" comment="libsoftokn3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514751" comment="libsoftokn3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514752" comment="mozilla-nss-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514753" comment="mozilla-nss-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514754" comment="mozilla-nss-certs-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514755" comment="mozilla-nss-certs-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514756" comment="mozilla-nss-tools-3.17.3-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514746" comment="MozillaFirefox-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514747" comment="MozillaFirefox-translations-31.4.0esr-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514748" comment="libfreebl3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514749" comment="libfreebl3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514750" comment="libsoftokn3-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514751" comment="libsoftokn3-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514752" comment="mozilla-nss-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514753" comment="mozilla-nss-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514754" comment="mozilla-nss-certs-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514755" comment="mozilla-nss-certs-32bit-3.17.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514756" comment="mozilla-nss-tools-3.17.3-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8680" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8680" ref_url="https://www.suse.com/security/cve/CVE-2014-8680" source="SUSE CVE"/>
    <description>
    The GeoIP functionality in ISC BIND 9.10.0 through 9.10.1 allows remote attackers to cause a denial of service (assertion failure and named exit) via vectors related to (1) the lack of GeoIP databases for both IPv4 and IPv6, or (2) IPv6 support with certain options.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8680/">CVE-2014-8680</cve>
	<bugzilla href="https://bugzilla.suse.com/908995">SUSE bug 908995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709</cve>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00100.html" source="SUSE-SU"/>
    <description>
    The JPEG decoder in ImageMagick before 6.8.9-9 allows local users to cause a denial of service (out-of-bounds memory access and crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514363" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514364" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514365" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514366" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514367" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8767" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514391" comment="tcpdump-4.5.1-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8768" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allow remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514391" comment="tcpdump-4.5.1-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514391" comment="tcpdump-4.5.1-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8884" ref_url="https://www.suse.com/security/cve/CVE-2014-8884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8884/">CVE-2014-8884</cve>
	<bugzilla href="https://bugzilla.suse.com/904876">SUSE bug 904876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905522">SUSE bug 905522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905739">SUSE bug 905739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905744">SUSE bug 905744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905748">SUSE bug 905748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905764">SUSE bug 905764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00034.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969774">SUSE bug 969774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102936" comment="libFLAC8-1.3.0-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102937" comment="libFLAC8-32bit-1.3.0-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142129" comment="libFLAC++6-32bit-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514382" comment="libFLAC8-1.3.0-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514383" comment="libFLAC8-32bit-1.3.0-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8991" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991" source="SUSE CVE"/>
    <description>
    pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991</cve>
	<bugzilla href="https://bugzilla.suse.com/907038">SUSE bug 907038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561558" comment="python-ply-3.4-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00034.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969774">SUSE bug 969774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102936" comment="libFLAC8-1.3.0-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102937" comment="libFLAC8-32bit-1.3.0-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142129" comment="libFLAC++6-32bit-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514382" comment="libFLAC8-1.3.0-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514383" comment="libFLAC8-32bit-1.3.0-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514968" comment="libjasper1-1.900.1-166.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514969" comment="libjasper1-32bit-1.900.1-166.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9050" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906770">SUSE bug 906770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514966" comment="clamav-0.98.5-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9065" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9065" ref_url="https://www.suse.com/security/cve/CVE-2014-9065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9065/">CVE-2014-9065</cve>
	<bugzilla href="https://bugzilla.suse.com/906996">SUSE bug 906996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9066" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9066" ref_url="https://www.suse.com/security/cve/CVE-2014-9066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability than CVE-2014-9065.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9066/">CVE-2014-9066</cve>
	<bugzilla href="https://bugzilla.suse.com/906996">SUSE bug 906996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1682-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00081.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996084">SUSE bug 996084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105094" comment="libksba8-1.3.0-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514634" comment="libksba8-1.3.0-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1735-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090</cve>
	<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00055.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo before 1.3.1 allows remote attackers to cause a denial of service (crash) via a crafted JPEG file, related to the Exif marker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<bugzilla href="https://bugzilla.suse.com/906761">SUSE bug 906761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105080" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105088" comment="libjpeg62-62.1.0-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105087" comment="libjpeg62-32bit-62.1.0-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105091" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105082" comment="libjpeg8-8.0.2-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105081" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105086" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170911" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170912" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170913" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170914" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170915" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170916" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170917" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514612" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514613" comment="libjpeg62-62.1.0-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514614" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514615" comment="libjpeg8-8.0.2-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514616" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514617" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9093" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1727-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 4.3.5 allows remote attackers to cause a denial of service (invalid write operation and crash) and possibly execute arbitrary code via a crafted RTF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<bugzilla href="https://bugzilla.suse.com/907636">SUSE bug 907636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514393" comment="libreoffice-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514394" comment="libreoffice-base-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514395" comment="libreoffice-base-drivers-mysql-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514396" comment="libreoffice-base-drivers-postgresql-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514397" comment="libreoffice-calc-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514398" comment="libreoffice-calc-extensions-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514399" comment="libreoffice-draw-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514400" comment="libreoffice-filters-optional-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514401" comment="libreoffice-gnome-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514402" comment="libreoffice-icon-theme-tango-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514403" comment="libreoffice-impress-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514404" comment="libreoffice-l10n-af-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514405" comment="libreoffice-l10n-ar-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514406" comment="libreoffice-l10n-ca-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514407" comment="libreoffice-l10n-cs-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514408" comment="libreoffice-l10n-da-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514409" comment="libreoffice-l10n-de-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514410" comment="libreoffice-l10n-en-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514411" comment="libreoffice-l10n-es-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514412" comment="libreoffice-l10n-fi-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514413" comment="libreoffice-l10n-fr-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514414" comment="libreoffice-l10n-gu-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514415" comment="libreoffice-l10n-hi-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514416" comment="libreoffice-l10n-hu-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514417" comment="libreoffice-l10n-it-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514418" comment="libreoffice-l10n-ja-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514419" comment="libreoffice-l10n-ko-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514420" comment="libreoffice-l10n-nb-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514421" comment="libreoffice-l10n-nl-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514422" comment="libreoffice-l10n-nn-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514423" comment="libreoffice-l10n-pl-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514424" comment="libreoffice-l10n-pt-BR-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514425" comment="libreoffice-l10n-pt-PT-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514426" comment="libreoffice-l10n-ru-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514427" comment="libreoffice-l10n-sk-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514428" comment="libreoffice-l10n-sv-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514429" comment="libreoffice-l10n-xh-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514430" comment="libreoffice-l10n-zh-Hans-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514431" comment="libreoffice-l10n-zh-Hant-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514432" comment="libreoffice-l10n-zu-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514433" comment="libreoffice-mailmerge-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514434" comment="libreoffice-math-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514435" comment="libreoffice-officebean-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514436" comment="libreoffice-pyuno-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514437" comment="libreoffice-writer-4.3.5.2-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514438" comment="libreoffice-writer-extensions-4.3.5.2-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1643-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00061.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102938" comment="cpio-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102939" comment="cpio-lang-2.11-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158948" comment="cpio-2.11-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158949" comment="cpio-lang-2.11-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512068" comment="cpio-2.11-36.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512069" comment="cpio-lang-2.11-36.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514379" comment="cpio-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514380" comment="cpio-lang-2.11-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001313.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html" source="SUSE-SU"/>
    <description>
    Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<bugzilla href="https://bugzilla.suse.com/907434">SUSE bug 907434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908742">SUSE bug 908742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140779" comment="libblkid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140780" comment="libblkid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140781" comment="libfdisk1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140782" comment="libmount1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140783" comment="libmount1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140784" comment="libsmartcols1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142130" comment="libuuid-devel-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140785" comment="libuuid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140786" comment="libuuid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140787" comment="python-libmount-2.28-40.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140788" comment="util-linux-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140789" comment="util-linux-lang-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140790" comment="util-linux-systemd-2.28-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140791" comment="uuidd-2.28-40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141904" comment="libblkid1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141905" comment="libblkid1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141906" comment="libmount1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141907" comment="libmount1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141908" comment="libsmartcols1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141909" comment="libuuid-devel-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141910" comment="libuuid1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141911" comment="libuuid1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141912" comment="python-libmount-2.25-30.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141913" comment="util-linux-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141914" comment="util-linux-lang-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141915" comment="util-linux-systemd-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141916" comment="uuidd-2.25-30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159070" comment="libblkid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159071" comment="libblkid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159072" comment="libfdisk1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159073" comment="libmount1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159074" comment="libmount1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159075" comment="libsmartcols1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159649" comment="libuuid-devel-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159076" comment="libuuid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159077" comment="libuuid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159078" comment="python-libmount-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159079" comment="util-linux-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159080" comment="util-linux-lang-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159081" comment="util-linux-systemd-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159082" comment="uuidd-2.29.2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512244" comment="libblkid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512245" comment="libblkid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512246" comment="libfdisk1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512247" comment="libmount1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512248" comment="libmount1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512249" comment="libsmartcols1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512250" comment="libuuid-devel-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512251" comment="libuuid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512252" comment="libuuid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512253" comment="python-libmount-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512254" comment="util-linux-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512255" comment="util-linux-lang-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512256" comment="util-linux-systemd-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512257" comment="uuidd-2.29.2-7.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515047" comment="libblkid1-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515048" comment="libblkid1-32bit-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515049" comment="libmount1-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515050" comment="libmount1-32bit-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515051" comment="libsmartcols1-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515052" comment="libuuid-devel-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515053" comment="libuuid1-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515054" comment="libuuid1-32bit-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515055" comment="python-libmount-2.25-10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515056" comment="util-linux-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515057" comment="util-linux-lang-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515058" comment="util-linux-systemd-2.25-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515059" comment="uuidd-2.25-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<bugzilla href="https://bugzilla.suse.com/907453">SUSE bug 907453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105068" comment="mutt-1.5.21-49.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141043" comment="mutt-1.6.0-54.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514800" comment="mutt-1.5.21-49.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0925-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1625-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" source="SUSE-SU"/>
    <description>
    scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<bugzilla href="https://bugzilla.suse.com/907809">SUSE bug 907809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921588">SUSE bug 921588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514921" comment="libyaml-0-2-0.1.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514734" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108642" comment="tcpdump-4.5.1-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141140" comment="tcpdump-4.5.1-10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514633" comment="tcpdump-4.5.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9157" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9157" ref_url="https://www.suse.com/security/cve/CVE-2014-9157" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3222-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00025.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9157/">CVE-2014-9157</cve>
	<bugzilla href="https://bugzilla.suse.com/908426">SUSE bug 908426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334142" comment="graphviz is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9162" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9162" ref_url="https://www.suse.com/security/cve/CVE-2014-9162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9162/">CVE-2014-9162</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514377" comment="flash-player-11.2.202.425-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514378" comment="flash-player-gnome-11.2.202.425-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9163" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9163" ref_url="https://www.suse.com/security/cve/CVE-2014-9163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 13.0.0.259 and 14.x and 15.x before 15.0.0.246 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in December 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9163/">CVE-2014-9163</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514377" comment="flash-player-11.2.202.425-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514378" comment="flash-player-gnome-11.2.202.425-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9164" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9164" ref_url="https://www.suse.com/security/cve/CVE-2014-9164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0587.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9164/">CVE-2014-9164</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514377" comment="flash-player-11.2.202.425-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514378" comment="flash-player-gnome-11.2.202.425-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0114-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<bugzilla href="https://bugzilla.suse.com/910491">SUSE bug 910491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515070" comment="strongswan-5.1.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515071" comment="strongswan-doc-5.1.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515072" comment="strongswan-ipsec-5.1.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515073" comment="strongswan-libs0-5.1.3-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9278" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9278" ref_url="https://www.suse.com/security/cve/CVE-2014-9278" source="SUSE CVE"/>
    <description>
    The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9278/">CVE-2014-9278</cve>
	<bugzilla href="https://bugzilla.suse.com/908424">SUSE bug 908424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-05"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515064" comment="ntp-4.2.6p5-37.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515065" comment="ntp-doc-4.2.6p5-37.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-05"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515064" comment="ntp-4.2.6p5-37.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515065" comment="ntp-doc-4.2.6p5-37.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1686-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1686-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7016020" ref_url="https://www.suse.com/support/kb/doc?id=7016020" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00024.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514384" comment="ntp-4.2.6p5-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514385" comment="ntp-doc-4.2.6p5-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00024.html" source="SUSE-SU"/>
    <description>
    The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-05"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514384" comment="ntp-4.2.6p5-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514385" comment="ntp-doc-4.2.6p5-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515064" comment="ntp-4.2.6p5-37.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515065" comment="ntp-doc-4.2.6p5-37.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515064" comment="ntp-4.2.6p5-37.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515065" comment="ntp-doc-4.2.6p5-37.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322</cve>
	<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9328" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915512">SUSE bug 915512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515089" comment="clamav-0.98.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514582" comment="glibc-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514583" comment="glibc-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514584" comment="glibc-devel-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514585" comment="glibc-devel-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514586" comment="glibc-i18ndata-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514587" comment="glibc-locale-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514588" comment="glibc-locale-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514589" comment="nscd-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333961" comment="glibc.i686 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419</cve>
	<bugzilla href="https://bugzilla.suse.com/911326">SUSE bug 911326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420</cve>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514956" comment="kernel-default-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514957" comment="kernel-default-devel-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514958" comment="kernel-default-extra-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514959" comment="kernel-devel-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514960" comment="kernel-macros-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514961" comment="kernel-source-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514962" comment="kernel-syms-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514963" comment="kernel-xen-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514964" comment="kernel-xen-devel-3.12.36-38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515085" comment="krb5-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515086" comment="krb5-32bit-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515087" comment="krb5-client-1.12.1-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515085" comment="krb5-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515086" comment="krb5-32bit-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515087" comment="krb5-client-1.12.1-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515085" comment="krb5-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515086" comment="krb5-32bit-1.12.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515087" comment="krb5-client-1.12.1-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00063.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106104" comment="libelf-devel-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515109" comment="elfutils-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515110" comment="libasm1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515111" comment="libdw1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515112" comment="libdw1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515113" comment="libebl1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515114" comment="libebl1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515115" comment="libelf1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515116" comment="libelf1-32bit-0.158-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9449" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9449" ref_url="https://www.suse.com/security/cve/CVE-2014-9449" source="SUSE CVE"/>
    <description>
    Buffer overflow in the RiffVideo::infoTagsHandler function in riffvideo.cpp in Exiv2 0.24 allows remote attackers to cause a denial of service (crash) via a long IKEY INFO tag value in an AVI file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9449/">CVE-2014-9449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9471" ref_url="https://www.suse.com/security/cve/CVE-2014-9471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001364.html" source="SUSE-SU"/>
    <description>
    The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9471/">CVE-2014-9471</cve>
	<bugzilla href="https://bugzilla.suse.com/911832">SUSE bug 911832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333935" comment="coreutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001208.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105814" comment="libmpfr4-3.1.2-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514990" comment="libmpfr4-3.1.2-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7016082" ref_url="https://www.suse.com/support/kb/doc/?id=7016082" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<bugzilla href="https://bugzilla.suse.com/912076">SUSE bug 912076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912929">SUSE bug 912929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514813" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514814" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333964" comment="libpng12 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105600" comment="libsndfile1-1.0.25-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105601" comment="libsndfile1-32bit-1.0.25-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514937" comment="libsndfile1-1.0.25-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514938" comment="libsndfile1-32bit-1.0.25-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1695-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960191">SUSE bug 960191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515701" comment="rsync-3.1.0-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516342" comment="rsync-3.1.0-9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0187-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0449-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qtmd_decompress function in libmspack 0.4 allows remote attackers to cause a denial of service (hang) via a crafted CAB file, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919283">SUSE bug 919283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107709" comment="libmspack0-0.4-10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514579" comment="libmspack0-0.4-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584</cve>
	<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585</cve>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514956" comment="kernel-default-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514957" comment="kernel-default-devel-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514958" comment="kernel-default-extra-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514959" comment="kernel-devel-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514960" comment="kernel-macros-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514961" comment="kernel-source-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514962" comment="kernel-syms-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514963" comment="kernel-xen-3.12.36-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514964" comment="kernel-xen-devel-3.12.36-38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9620" ref_url="https://www.suse.com/security/cve/CVE-2014-9620" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9620/">CVE-2014-9620</cve>
	<bugzilla href="https://bugzilla.suse.com/913651">SUSE bug 913651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512122" comment="file-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512123" comment="file-magic-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512124" comment="libmagic1-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512125" comment="libmagic1-32bit-5.22-10.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518307" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518308" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518309" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518310" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9621" ref_url="https://www.suse.com/security/cve/CVE-2014-9621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9621/">CVE-2014-9621</cve>
	<bugzilla href="https://bugzilla.suse.com/913650">SUSE bug 913650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512122" comment="file-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512123" comment="file-magic-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512124" comment="libmagic1-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512125" comment="libmagic1-32bit-5.22-10.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518307" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518308" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518309" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518310" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9622" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001219.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0191-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<bugzilla href="https://bugzilla.suse.com/913676">SUSE bug 913676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106065" comment="xdg-utils-20140630-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177962" comment="xdg-utils-20140630-6.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515061" comment="xdg-utils-20140630-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515352" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520123" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0522-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html" source="SUSE-SU"/>
    <description>
    oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514742" comment="vorbis-tools-1.4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514743" comment="vorbis-tools-lang-1.4.0-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0522-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<bugzilla href="https://bugzilla.suse.com/1081744">SUSE bug 1081744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514742" comment="vorbis-tools-1.4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514743" comment="vorbis-tools-lang-1.4.0-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9640" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0231-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00032.html" source="SUSE-SU"/>
    <description>
    oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914938">SUSE bug 914938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919283">SUSE bug 919283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515380" comment="vorbis-tools-1.4.0-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515381" comment="vorbis-tools-lang-1.4.0-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9645" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001555.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1083-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00041.html" source="SUSE-SU"/>
    <description>
    The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<bugzilla href="https://bugzilla.suse.com/914423">SUSE bug 914423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914660">SUSE bug 914660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113975" comment="busybox-1.21.1-3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514936" comment="busybox-1.21.1-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653</cve>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512122" comment="file-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512123" comment="file-magic-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512124" comment="libmagic1-5.22-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512125" comment="libmagic1-32bit-5.22-10.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518307" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518308" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518309" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518310" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002018.html" source="SUSE-SU"/>
    <description>
    The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107566" comment="icu-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107572" comment="libicu52_1-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107571" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107573" comment="libicu52_1-data-52.1-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514555" comment="icu-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514556" comment="libicu52_1-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514557" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514558" comment="libicu52_1-data-52.1-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514951" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514952" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<bugzilla href="https://bugzilla.suse.com/916847">SUSE bug 916847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<bugzilla href="https://bugzilla.suse.com/916860">SUSE bug 916860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<bugzilla href="https://bugzilla.suse.com/916862">SUSE bug 916862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<bugzilla href="https://bugzilla.suse.com/916868">SUSE bug 916868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561620" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561621" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561622" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0465-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001311.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0381-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00098.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<bugzilla href="https://bugzilla.suse.com/917799">SUSE bug 917799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514566" comment="cups-1.7.5-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514567" comment="cups-client-1.7.5-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514568" comment="cups-libs-1.7.5-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514569" comment="cups-libs-32bit-1.7.5-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1849-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1913-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2983-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3004-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919737">SUSE bug 919737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953359">SUSE bug 953359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516652" comment="sudo-1.8.10p3-2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9687" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" source="SUSE-SU"/>
    <description>
    eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515729" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515730" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
    <description>
    The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923946">SUSE bug 923946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009109545" comment="gd-2.1.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109546" comment="gd-32bit-2.1.0-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514687" comment="gd-2.1.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514688" comment="gd-32bit-2.1.0-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9710" ref_url="https://www.suse.com/security/cve/CVE-2014-9710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
    <description>
    The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9710/">CVE-2014-9710</cve>
	<bugzilla href="https://bugzilla.suse.com/923908">SUSE bug 923908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939260">SUSE bug 939260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9717" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9717" ref_url="https://www.suse.com/security/cve/CVE-2014-9717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
    <description>
    fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9717/">CVE-2014-9717</cve>
	<bugzilla href="https://bugzilla.suse.com/928547">SUSE bug 928547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964431">SUSE bug 964431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9720" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9720" ref_url="https://www.suse.com/security/cve/CVE-2014-9720" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1998-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00080.html" source="SUSE-SU"/>
    <description>
    Tornado before 3.2.2 sends arbitrary responses that contain a fixed CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9720/">CVE-2014-9720</cve>
	<bugzilla href="https://bugzilla.suse.com/833754">SUSE bug 833754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930361">SUSE bug 930361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930362">SUSE bug 930362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515948" comment="python-backports.ssl_match_hostname-3.4.0.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515949" comment="python-tornado-4.2.1-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9721" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721</cve>
	<bugzilla href="https://bugzilla.suse.com/931978">SUSE bug 931978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114236" comment="libzmq3-4.0.4-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142147" comment="libzmq3-4.0.4-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159706" comment="libzmq3-4.0.4-14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514967" comment="libzmq3-4.0.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9732" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The cabd_extract function in cabd.c in libmspack before 0.5 does not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9745" ref_url="https://www.suse.com/security/cve/CVE-2014-9745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1704-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9745/">CVE-2014-9745</cve>
	<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9746" ref_url="https://www.suse.com/security/cve/CVE-2014-9746" source="SUSE CVE"/>
    <description>
    The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9746/">CVE-2014-9746</cve>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9747" ref_url="https://www.suse.com/security/cve/CVE-2014-9747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1704-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly update the current position for immediates-only mode, which allows remote attackers to cause a denial of service (infinite loop) via a Type42 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9747/">CVE-2014-9747</cve>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1995-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html" source="SUSE-SU"/>
    <description>
    The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515282" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515283" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515782" comment="glibc-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515783" comment="glibc-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515784" comment="glibc-devel-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515785" comment="glibc-devel-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515786" comment="glibc-i18ndata-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515787" comment="glibc-locale-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515788" comment="glibc-locale-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515789" comment="nscd-2.19-22.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516844" comment="glibc-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516845" comment="glibc-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516846" comment="glibc-devel-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516847" comment="glibc-devel-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516848" comment="glibc-i18ndata-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516849" comment="glibc-locale-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516850" comment="glibc-locale-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516851" comment="nscd-2.19-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9769" ref_url="https://www.suse.com/security/cve/CVE-2014-9769" source="SUSE CVE"/>
    <description>
    pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9769/">CVE-2014-9769</cve>
	<bugzilla href="https://bugzilla.suse.com/973012">SUSE bug 973012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9770" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9770" ref_url="https://www.suse.com/security/cve/CVE-2014-9770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html" source="SUSE-SU"/>
    <description>
    tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9770/">CVE-2014-9770</cve>
	<bugzilla href="https://bugzilla.suse.com/972612">SUSE bug 972612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516043" comment="libgudev-1_0-0-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516044" comment="libgudev-1_0-0-32bit-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516045" comment="libudev1-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516046" comment="libudev1-32bit-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516047" comment="systemd-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516048" comment="systemd-32bit-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516049" comment="systemd-bash-completion-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516050" comment="systemd-sysvinit-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516051" comment="udev-210-70.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517012" comment="libgudev-1_0-0-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517013" comment="libgudev-1_0-0-32bit-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517014" comment="libudev1-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517015" comment="libudev1-32bit-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517016" comment="systemd-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517017" comment="systemd-32bit-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517018" comment="systemd-bash-completion-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517019" comment="systemd-sysvinit-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517020" comment="udev-210-104.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9804" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9804" ref_url="https://www.suse.com/security/cve/CVE-2014-9804" source="SUSE CVE"/>
    <description>
    vision.c in ImageMagick allows remote attackers to cause a denial of service (infinite loop) via vectors related to "too many object."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9804/">CVE-2014-9804</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983750">SUSE bug 983750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9805" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted pnm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9806" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (file descriptor consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9807" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The pdb coder in ImageMagick allows remote attackers to cause a denial of service (double free) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9808" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted dpc image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9809" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted xwd image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9810" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The dpx file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed dpx file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The xwd file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed xwd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted ps file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9813" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted viff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9814" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted wpg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9815" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted wpg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9816" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted viff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9817" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pdb file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9818" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a malformed sun file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9819" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9823.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9820" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pnm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9821" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9821" ref_url="https://www.suse.com/security/cve/CVE-2014-9821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted xpm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9821/">CVE-2014-9821</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984014">SUSE bug 984014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9822" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9823" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9819.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9824" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9825.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9825" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9825" ref_url="https://www.suse.com/security/cve/CVE-2014-9825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9824.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9825/">CVE-2014-9825</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984427">SUSE bug 984427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9826" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to have unspecified impact via vectors related to error handling in sun files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9827" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9827" ref_url="https://www.suse.com/security/cve/CVE-2014-9827" source="SUSE CVE"/>
    <description>
    coders/xpm.c in ImageMagick allows remote attackers to have unspecified impact via a crafted xpm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9827/">CVE-2014-9827</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984170">SUSE bug 984170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9828" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9829" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted sun file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9830" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    coders/sun.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted sun file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9831" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted wpg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9832" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9832" ref_url="https://www.suse.com/security/cve/CVE-2014-9832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted pcx file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9832/">CVE-2014-9832</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984183">SUSE bug 984183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9833" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9833" ref_url="https://www.suse.com/security/cve/CVE-2014-9833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted psd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9833/">CVE-2014-9833</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984406">SUSE bug 984406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984427">SUSE bug 984427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9834" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted pict file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9835" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted wpf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9836" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service via a crafted xpm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9837" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    coders/pnm.c in ImageMagick 6.9.0-1 Beta and earlier allows remote attackers to cause a denial of service (crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9838" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    magick/cache.c in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9839" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    magick/colormap-private.h in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9840" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted palm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9841" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9841" ref_url="https://www.suse.com/security/cve/CVE-2014-9841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors, related to "throwing of exceptions."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9841/">CVE-2014-9841</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984172">SUSE bug 984172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9842" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984172">SUSE bug 984172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9843" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9843" ref_url="https://www.suse.com/security/cve/CVE-2014-9843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DecodePSDPixels function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9843/">CVE-2014-9843</cve>
	<bugzilla href="https://bugzilla.suse.com/1000697">SUSE bug 1000697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984179">SUSE bug 984179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9844" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9845" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The ReadDIBImage function in coders/dib.c in ImageMagick allows remote attackers to cause a denial of service (crash) via a corrupted dib file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9846" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9847" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The jng decoder in ImageMagick 6.8.9.9 allows remote attackers to have an unspecified impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9848" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    Memory leak in ImageMagick allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984404">SUSE bug 984404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516767" comment="ImageMagick-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516768" comment="libMagick++-6_Q16-3-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516769" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516770" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516771" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9849" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The png coder in ImageMagick allows remote attackers to cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9850" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9850" ref_url="https://www.suse.com/security/cve/CVE-2014-9850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Logic error in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (resource consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9850/">CVE-2014-9850</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984149">SUSE bug 984149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9851" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9852" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9852" ref_url="https://www.suse.com/security/cve/CVE-2014-9852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    distribute-cache.c in ImageMagick re-uses objects after they have been destroyed, which allows remote attackers to have unspecified impact via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9852/">CVE-2014-9852</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984191">SUSE bug 984191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9853" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Memory leak in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (memory consumption) via a crafted rle file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9854" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    coders/tiff.c in ImageMagick allows remote attackers to cause a denial of service (application crash) via vectors related to the "identification of image."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9892" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9892" ref_url="https://www.suse.com/security/cve/CVE-2014-9892" source="SUSE CVE"/>
    <description>
    The snd_compr_tstamp function in sound/core/compress_offload.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize a timestamp data structure, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28770164 and Qualcomm internal bug CR568717.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9892/">CVE-2014-9892</cve>
	<bugzilla href="https://bugzilla.suse.com/992731">SUSE bug 992731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9903" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9903" ref_url="https://www.suse.com/security/cve/CVE-2014-9903" source="SUSE CVE"/>
    <description>
    The sched_read_attr function in kernel/sched/core.c in the Linux kernel 3.14-rc before 3.14-rc4 uses an incorrect size, which allows local users to obtain sensitive information from kernel stack memory via a crafted sched_getattr system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9903/">CVE-2014-9903</cve>
	<bugzilla href="https://bugzilla.suse.com/986794">SUSE bug 986794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9904" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9904" ref_url="https://www.suse.com/security/cve/CVE-2014-9904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9904/">CVE-2014-9904</cve>
	<bugzilla href="https://bugzilla.suse.com/986811">SUSE bug 986811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986941">SUSE bug 986941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9907" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/dds.c in ImageMagick allows remote attackers to cause a denial of service via a crafted DDS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907</cve>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9913" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520123" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9914" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9914" ref_url="https://www.suse.com/security/cve/CVE-2014-9914" source="SUSE CVE"/>
    <description>
    Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9914/">CVE-2014-9914</cve>
	<bugzilla href="https://bugzilla.suse.com/1023997">SUSE bug 1023997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9915" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9915" ref_url="https://www.suse.com/security/cve/CVE-2014-9915" source="SUSE CVE"/>
    <description>
    Off-by-one error in ImageMagick before 6.6.0-4 allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM profile.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9915/">CVE-2014-9915</cve>
	<bugzilla href="https://bugzilla.suse.com/1016575">SUSE bug 1016575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017306">SUSE bug 1017306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9922" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
    <description>
    The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922</cve>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105209">SUSE bug 1105209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9940" ref_url="https://www.suse.com/security/cve/CVE-2014-9940" source="SUSE CVE"/>
    <description>
    The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9940/">CVE-2014-9940</cve>
	<bugzilla href="https://bugzilla.suse.com/1037307">SUSE bug 1037307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016252" ref_url="https://www.suse.com/support/kb/doc?id=7016252" source="SUSE-SU"/>
		<reference ref_id="TID7016260" ref_url="https://www.suse.com/support/kb/doc/?id=7016260" source="SUSE-SU"/>
		<reference ref_id="TID7016273" ref_url="https://www.suse.com/support/kb/doc/?id=7016273" source="SUSE-SU"/>
		<reference ref_id="TID7016312" ref_url="https://www.suse.com/support/kb/doc/?id=7016312" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7016340" ref_url="https://www.suse.com/support/kb/doc/?id=7016340" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920482">SUSE bug 920482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920484">SUSE bug 920484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515125" comment="libopenssl0_9_8-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515126" comment="libopenssl0_9_8-32bit-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514984" comment="libopenssl1_0_0-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514985" comment="libopenssl1_0_0-32bit-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514986" comment="openssl-1.0.1i-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515125" comment="libopenssl0_9_8-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515126" comment="libopenssl0_9_8-32bit-0.9.8j-70.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514984" comment="libopenssl1_0_0-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514985" comment="libopenssl1_0_0-32bit-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514986" comment="openssl-1.0.1i-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
    <description>
    Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<bugzilla href="https://bugzilla.suse.com/912292">SUSE bug 912292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514984" comment="libopenssl1_0_0-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514985" comment="libopenssl1_0_0-32bit-1.0.1i-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514986" comment="openssl-1.0.1i-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514602" comment="libopenssl0_9_8-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514603" comment="libopenssl0_9_8-32bit-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514599" comment="libopenssl1_0_0-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514600" comment="libopenssl1_0_0-32bit-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514601" comment="openssl-1.0.1i-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004183.html" source="SUSE-SU"/>
    <description>
    wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514741" comment="wpa_supplicant-2.2-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7016113" ref_url="https://www.suse.com/support/kb/doc?id=7016113" source="SUSE-SU"/>
		<reference ref_id="TID7016115" ref_url="https://www.suse.com/support/kb/doc/?id=7016115" source="SUSE-SU"/>
		<reference ref_id="TID7016118" ref_url="https://www.suse.com/support/kb/doc/?id=7016118" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="TID7016171" ref_url="https://www.suse.com/support/kb/doc/?id=7016171" source="SUSE-SU"/>
		<reference ref_id="TID7016215" ref_url="https://www.suse.com/support/kb/doc/?id=7016215" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-23"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235</cve>
	<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913646">SUSE bug 913646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949238">SUSE bug 949238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0225-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00028.html" source="SUSE-SU"/>
    <description>
    libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<bugzilla href="https://bugzilla.suse.com/914693">SUSE bug 914693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515735" comment="libvirt-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515736" comment="libvirt-client-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515737" comment="libvirt-client-32bit-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515738" comment="libvirt-daemon-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515739" comment="libvirt-daemon-config-network-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515740" comment="libvirt-daemon-config-nwfilter-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515741" comment="libvirt-daemon-driver-interface-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515742" comment="libvirt-daemon-driver-libxl-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515743" comment="libvirt-daemon-driver-lxc-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515744" comment="libvirt-daemon-driver-network-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515745" comment="libvirt-daemon-driver-nodedev-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515746" comment="libvirt-daemon-driver-nwfilter-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515747" comment="libvirt-daemon-driver-qemu-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515748" comment="libvirt-daemon-driver-secret-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515749" comment="libvirt-daemon-driver-storage-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515750" comment="libvirt-daemon-lxc-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515751" comment="libvirt-daemon-qemu-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515752" comment="libvirt-daemon-xen-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515753" comment="libvirt-doc-1.2.5-27.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515304" comment="libdcerpc-binding0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515305" comment="libdcerpc-binding0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515306" comment="libdcerpc0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515307" comment="libdcerpc0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515308" comment="libgensec0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515309" comment="libgensec0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515310" comment="libndr-krb5pac0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515311" comment="libndr-krb5pac0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515312" comment="libndr-nbt0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515313" comment="libndr-nbt0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515314" comment="libndr-standard0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515315" comment="libndr-standard0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515316" comment="libndr0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515317" comment="libndr0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515318" comment="libnetapi0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515319" comment="libnetapi0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515320" comment="libpdb0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515321" comment="libpdb0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515322" comment="libregistry0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515323" comment="libsamba-credentials0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515324" comment="libsamba-credentials0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515325" comment="libsamba-hostconfig0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515326" comment="libsamba-hostconfig0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515327" comment="libsamba-util0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515328" comment="libsamba-util0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515329" comment="libsamdb0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515330" comment="libsamdb0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515331" comment="libsmbclient-raw0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515332" comment="libsmbclient-raw0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515333" comment="libsmbclient0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515334" comment="libsmbclient0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515335" comment="libsmbconf0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515336" comment="libsmbconf0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515337" comment="libsmbldap0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515338" comment="libsmbldap0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515339" comment="libtevent-util0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515340" comment="libtevent-util0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515341" comment="libwbclient0-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515342" comment="libwbclient0-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515343" comment="samba-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515344" comment="samba-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515345" comment="samba-client-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515346" comment="samba-client-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515347" comment="samba-doc-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515348" comment="samba-libs-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515349" comment="samba-libs-32bit-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515350" comment="samba-winbind-4.1.12-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515351" comment="samba-winbind-32bit-4.1.12-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00042.html" source="SUSE-SU"/>
    <description>
    The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template, which triggers a buffer over-read, or (2) crafted timestamp formatting template, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514570" comment="libecpg6-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514571" comment="libpq5-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514572" comment="libpq5-32bit-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514573" comment="postgresql93-9.3.6-5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00042.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in contrib/pgcrypto in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514570" comment="libecpg6-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514571" comment="libpq5-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514572" comment="libpq5-32bit-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514573" comment="postgresql93-9.3.6-5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 does not properly handle errors while reading a protocol message, which allows remote attackers to conduct SQL injection attacks via crafted binary data in a parameter and causing an error, which triggers the loss of synchronization and part of the protocol message to be treated as a new message, as demonstrated by causing a timeout or query cancellation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514570" comment="libecpg6-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514571" comment="libpq5-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514572" comment="libpq5-32bit-9.3.6-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514573" comment="postgresql93-9.3.6-5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00017.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<bugzilla href="https://bugzilla.suse.com/1003898">SUSE bug 1003898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916343">SUSE bug 916343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514562" comment="dbus-1-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514563" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113256" comment="e2fsprogs-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113260" comment="libcom_err2-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113261" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113264" comment="libext2fs2-1.42.11-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158971" comment="e2fsprogs-1.42.11-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158972" comment="libcom_err2-1.42.11-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158973" comment="libcom_err2-32bit-1.42.11-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158974" comment="libext2fs2-1.42.11-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512114" comment="e2fsprogs-1.43.8-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512115" comment="libcom_err2-1.43.8-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512116" comment="libcom_err2-32bit-1.43.8-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512117" comment="libext2fs2-1.43.8-1.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514859" comment="e2fsprogs-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514860" comment="libcom_err2-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514861" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514862" comment="libext2fs2-1.42.11-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001316.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html" source="SUSE-SU"/>
    <description>
    internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252</cve>
	<bugzilla href="https://bugzilla.suse.com/920810">SUSE bug 920810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108092" comment="libxerces-c-3_1-3.1.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108093" comment="libxerces-c-3_1-32bit-3.1.1-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514604" comment="libxerces-c-3_1-3.1.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514605" comment="libxerces-c-3_1-32bit-3.1.1-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001403.html" source="SUSE-SU"/>
		<reference ref_id="TID7016170" ref_url="https://www.suse.com/support/kb/doc/?id=7016170" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0338-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00086.html" source="SUSE-SU"/>
    <description>
    X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140770" comment="libXvnc1-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140771" comment="tigervnc-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140772" comment="xorg-x11-Xvnc-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142062" comment="tigervnc-1.4.3-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142063" comment="xorg-x11-Xvnc-1.4.3-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154696" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154697" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154698" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512241" comment="libXvnc1-1.6.0-18.23.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512242" comment="tigervnc-1.6.0-18.23.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512243" comment="xorg-x11-Xvnc-1.6.0-18.23.72 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514718" comment="libfltk1-1.3.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514719" comment="tigervnc-1.4.1-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514720" comment="xorg-x11-Xvnc-1.4.1-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514543" comment="xorg-x11-server-7.6_1.15.2-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514544" comment="xorg-x11-server-extra-7.6_1.15.2-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514633" comment="tcpdump-4.5.1-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0272" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0275" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0275" ref_url="https://www.suse.com/security/cve/CVE-2015-0275" source="SUSE CVE"/>
    <description>
    The ext4_zero_range function in fs/ext4/extents.c in the Linux kernel before 4.1 allows local users to cause a denial of service (BUG) via a crafted fallocate zero-range request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0275/">CVE-2015-0275</cve>
	<bugzilla href="https://bugzilla.suse.com/919032">SUSE bug 919032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0282" ref_url="https://www.suse.com/security/cve/CVE-2015-0282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0282/">CVE-2015-0282</cve>
	<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921684">SUSE bug 921684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514602" comment="libopenssl0_9_8-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514603" comment="libopenssl0_9_8-32bit-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514599" comment="libopenssl1_0_0-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514600" comment="libopenssl1_0_0-32bit-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514601" comment="openssl-1.0.1i-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561627" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561628" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514926" comment="libopenssl1_0_0-1.0.1i-27.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514927" comment="libopenssl1_0_0-32bit-1.0.1i-27.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514928" comment="openssl-1.0.1i-27.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514602" comment="libopenssl0_9_8-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514603" comment="libopenssl0_9_8-32bit-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514599" comment="libopenssl1_0_0-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514600" comment="libopenssl1_0_0-32bit-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514601" comment="openssl-1.0.1i-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514602" comment="libopenssl0_9_8-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514603" comment="libopenssl0_9_8-32bit-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514599" comment="libopenssl1_0_0-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514600" comment="libopenssl1_0_0-32bit-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514601" comment="openssl-1.0.1i-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514602" comment="libopenssl0_9_8-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514603" comment="libopenssl0_9_8-32bit-0.9.8j-73.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514602" comment="libopenssl0_9_8-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514603" comment="libopenssl0_9_8-32bit-0.9.8j-73.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514599" comment="libopenssl1_0_0-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514600" comment="libopenssl1_0_0-32bit-1.0.1i-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514601" comment="openssl-1.0.1i-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001351.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0622-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00086.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-18"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514655" comment="gnutls-3.2.15-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514656" comment="libgnutls28-3.2.15-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514657" comment="libgnutls28-32bit-3.2.15-7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html" source="SUSE-SU"/>
    <description>
    The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936523">SUSE bug 936523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141900" comment="libQt5Core5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141901" comment="libQt5DBus5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141902" comment="libQt5Gui5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141903" comment="libQt5Widgets5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159044" comment="libQt5Concurrent5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159045" comment="libQt5Core5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159046" comment="libQt5DBus5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159047" comment="libQt5Gui5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159048" comment="libQt5Network5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159049" comment="libQt5OpenGL5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159050" comment="libQt5PrintSupport5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159051" comment="libQt5Sql5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159052" comment="libQt5Sql5-mysql-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159053" comment="libQt5Sql5-postgresql-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159054" comment="libQt5Sql5-sqlite-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159055" comment="libQt5Sql5-unixODBC-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159056" comment="libQt5Test5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159057" comment="libQt5Widgets5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159058" comment="libQt5Xml5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512213" comment="libQt5Concurrent5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512214" comment="libQt5Core5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512215" comment="libQt5DBus5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512216" comment="libQt5Gui5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512217" comment="libQt5Network5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512218" comment="libQt5OpenGL5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512219" comment="libQt5PrintSupport5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512220" comment="libQt5Sql5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512221" comment="libQt5Sql5-mysql-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512222" comment="libQt5Sql5-postgresql-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512223" comment="libQt5Sql5-sqlite-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512224" comment="libQt5Sql5-unixODBC-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512225" comment="libQt5Test5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512226" comment="libQt5Widgets5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512227" comment="libQt5Xml5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514917" comment="libQt5Core5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514918" comment="libQt5DBus5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514919" comment="libQt5Gui5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514920" comment="libQt5Widgets5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514871" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514872" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514873" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514874" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514875" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514876" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514877" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514878" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514879" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514880" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514881" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514882" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514883" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514884" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514885" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514886" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0296" ref_url="https://www.suse.com/security/cve/CVE-2015-0296" source="SUSE CVE"/>
    <description>
    The pre-install script in texlive 3.1.20140525_r34255.fc21 as packaged in Fedora 21 and rpm, and texlive 6.20131226_r32488.fc20 and rpm allows local users to delete arbitrary files via a crafted file in the user's home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0296/">CVE-2015-0296</cve>
	<bugzilla href="https://bugzilla.suse.com/920172">SUSE bug 920172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334271" comment="texlive is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0301" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0301" ref_url="https://www.suse.com/security/cve/CVE-2015-0301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0301/">CVE-2015-0301</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0302" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0302" ref_url="https://www.suse.com/security/cve/CVE-2015-0302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0302/">CVE-2015-0302</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0303" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0303" ref_url="https://www.suse.com/security/cve/CVE-2015-0303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0303/">CVE-2015-0303</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0304" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0304" ref_url="https://www.suse.com/security/cve/CVE-2015-0304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0304/">CVE-2015-0304</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0305" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0305" ref_url="https://www.suse.com/security/cve/CVE-2015-0305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0305/">CVE-2015-0305</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0306" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0306" ref_url="https://www.suse.com/security/cve/CVE-2015-0306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0306/">CVE-2015-0306</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0307" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0307" ref_url="https://www.suse.com/security/cve/CVE-2015-0307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0307/">CVE-2015-0307</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0308" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0308" ref_url="https://www.suse.com/security/cve/CVE-2015-0308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0308/">CVE-2015-0308</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0309" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0309" ref_url="https://www.suse.com/security/cve/CVE-2015-0309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0309/">CVE-2015-0309</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0310" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0310" ref_url="https://www.suse.com/security/cve/CVE-2015-0310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.262 and 14.x through 16.x before 16.0.0.287 on Windows and OS X and before 11.2.202.438 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism on Windows, and have an unspecified impact on other platforms, via unknown vectors, as exploited in the wild in January 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0310/">CVE-2015-0310</cve>
	<bugzilla href="https://bugzilla.suse.com/914333">SUSE bug 914333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514929" comment="flash-player-11.2.202.438-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514930" comment="flash-player-gnome-11.2.202.438-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0311" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0311" ref_url="https://www.suse.com/security/cve/CVE-2015-0311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0311/">CVE-2015-0311</cve>
	<bugzilla href="https://bugzilla.suse.com/914463">SUSE bug 914463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514931" comment="flash-player-11.2.202.440-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514932" comment="flash-player-gnome-11.2.202.440-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0313" ref_url="https://www.suse.com/security/cve/CVE-2015-0313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0313/">CVE-2015-0313</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916374">SUSE bug 916374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0314" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0314" ref_url="https://www.suse.com/security/cve/CVE-2015-0314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0314/">CVE-2015-0314</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0315" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0315" ref_url="https://www.suse.com/security/cve/CVE-2015-0315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0320, and CVE-2015-0322.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0315/">CVE-2015-0315</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0316" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0316" ref_url="https://www.suse.com/security/cve/CVE-2015-0316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0316/">CVE-2015-0316</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0317" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0317" ref_url="https://www.suse.com/security/cve/CVE-2015-0317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0319.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0317/">CVE-2015-0317</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0318" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0318" ref_url="https://www.suse.com/security/cve/CVE-2015-0318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0318/">CVE-2015-0318</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0319" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0319" ref_url="https://www.suse.com/security/cve/CVE-2015-0319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0317.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0319/">CVE-2015-0319</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0320" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0320" ref_url="https://www.suse.com/security/cve/CVE-2015-0320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, and CVE-2015-0322.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0320/">CVE-2015-0320</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0321" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0321" ref_url="https://www.suse.com/security/cve/CVE-2015-0321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0329, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0321/">CVE-2015-0321</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0322" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0322" ref_url="https://www.suse.com/security/cve/CVE-2015-0322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, and CVE-2015-0320.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0322/">CVE-2015-0322</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0323" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0323" ref_url="https://www.suse.com/security/cve/CVE-2015-0323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0327.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0323/">CVE-2015-0323</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0324" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0324" ref_url="https://www.suse.com/security/cve/CVE-2015-0324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0324/">CVE-2015-0324</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0325" ref_url="https://www.suse.com/security/cve/CVE-2015-0325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0326 and CVE-2015-0328.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0325/">CVE-2015-0325</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0326" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0326" ref_url="https://www.suse.com/security/cve/CVE-2015-0326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0325 and CVE-2015-0328.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0326/">CVE-2015-0326</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0327" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0327" ref_url="https://www.suse.com/security/cve/CVE-2015-0327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0323.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0327/">CVE-2015-0327</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0328" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0328" ref_url="https://www.suse.com/security/cve/CVE-2015-0328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0325 and CVE-2015-0326.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0328/">CVE-2015-0328</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0329" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0329" ref_url="https://www.suse.com/security/cve/CVE-2015-0329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0329/">CVE-2015-0329</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0330" ref_url="https://www.suse.com/security/cve/CVE-2015-0330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0329.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0330/">CVE-2015-0330</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0331" ref_url="https://www.suse.com/security/cve/CVE-2015-0331" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0331/">CVE-2015-0331</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0332" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0332" ref_url="https://www.suse.com/security/cve/CVE-2015-0332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0333, CVE-2015-0335, and CVE-2015-0339.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0332/">CVE-2015-0332</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922296">SUSE bug 922296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0333" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0333" ref_url="https://www.suse.com/security/cve/CVE-2015-0333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0335, and CVE-2015-0339.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0333/">CVE-2015-0333</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0334" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0334" ref_url="https://www.suse.com/security/cve/CVE-2015-0334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0336.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0334/">CVE-2015-0334</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0335" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0335" ref_url="https://www.suse.com/security/cve/CVE-2015-0335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0339.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0335/">CVE-2015-0335</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0336" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0336" ref_url="https://www.suse.com/security/cve/CVE-2015-0336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0334.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0336/">CVE-2015-0336</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0337" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0337" ref_url="https://www.suse.com/security/cve/CVE-2015-0337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0337/">CVE-2015-0337</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0338" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0338" ref_url="https://www.suse.com/security/cve/CVE-2015-0338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0338/">CVE-2015-0338</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0339" ref_url="https://www.suse.com/security/cve/CVE-2015-0339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0339/">CVE-2015-0339</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0340" ref_url="https://www.suse.com/security/cve/CVE-2015-0340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows remote attackers to bypass intended file-upload restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0340/">CVE-2015-0340</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0341" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0341" ref_url="https://www.suse.com/security/cve/CVE-2015-0341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0342.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0341/">CVE-2015-0341</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0342" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0342" ref_url="https://www.suse.com/security/cve/CVE-2015-0342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0342/">CVE-2015-0342</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0346" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0346" ref_url="https://www.suse.com/security/cve/CVE-2015-0346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0359.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0346/">CVE-2015-0346</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0347" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0347" ref_url="https://www.suse.com/security/cve/CVE-2015-0347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0347/">CVE-2015-0347</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0348" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0348" ref_url="https://www.suse.com/security/cve/CVE-2015-0348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0348/">CVE-2015-0348</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0349" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0349" ref_url="https://www.suse.com/security/cve/CVE-2015-0349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0351, CVE-2015-0358, and CVE-2015-3039.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0349/">CVE-2015-0349</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0350" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0350" ref_url="https://www.suse.com/security/cve/CVE-2015-0350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0350/">CVE-2015-0350</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0351" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0351" ref_url="https://www.suse.com/security/cve/CVE-2015-0351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0351/">CVE-2015-0351</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0352" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0352" ref_url="https://www.suse.com/security/cve/CVE-2015-0352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0352/">CVE-2015-0352</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0353" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0353" ref_url="https://www.suse.com/security/cve/CVE-2015-0353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0353/">CVE-2015-0353</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0354" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0354" ref_url="https://www.suse.com/security/cve/CVE-2015-0354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0354/">CVE-2015-0354</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0355" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0355" ref_url="https://www.suse.com/security/cve/CVE-2015-0355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0355/">CVE-2015-0355</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0356" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0356" ref_url="https://www.suse.com/security/cve/CVE-2015-0356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0356/">CVE-2015-0356</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0357" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0357" ref_url="https://www.suse.com/security/cve/CVE-2015-0357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3040.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0357/">CVE-2015-0357</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0358" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0358" ref_url="https://www.suse.com/security/cve/CVE-2015-0358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-3039.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0358/">CVE-2015-0358</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0359" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0359" ref_url="https://www.suse.com/security/cve/CVE-2015-0359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0346.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0359/">CVE-2015-0359</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0360" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0360" ref_url="https://www.suse.com/security/cve/CVE-2015-0360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0360/">CVE-2015-0360</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0361" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0361" ref_url="https://www.suse.com/security/cve/CVE-2015-0361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Xen 4.2.x, 4.3.x, and 4.4.x allows remote domains to cause a denial of service (system crash) via a crafted hypercall during HVM guest teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0361/">CVE-2015-0361</cve>
	<bugzilla href="https://bugzilla.suse.com/910681">SUSE bug 910681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0391" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0400" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0484" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0484" ref_url="https://www.suse.com/security/cve/CVE-2015-0484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0492.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0484/">CVE-2015-0484</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0492" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0492" ref_url="https://www.suse.com/security/cve/CVE-2015-0492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0484.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0492/">CVE-2015-0492</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0559" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515279" comment="wireshark-1.10.12-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515279" comment="wireshark-1.10.12-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0561" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<bugzilla href="https://bugzilla.suse.com/912368">SUSE bug 912368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515279" comment="wireshark-1.10.12-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<bugzilla href="https://bugzilla.suse.com/912369">SUSE bug 912369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515279" comment="wireshark-1.10.12-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<bugzilla href="https://bugzilla.suse.com/912370">SUSE bug 912370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515279" comment="wireshark-1.10.12-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<bugzilla href="https://bugzilla.suse.com/912372">SUSE bug 912372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515279" comment="wireshark-1.10.12-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514619" comment="kernel-default-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514620" comment="kernel-default-devel-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514621" comment="kernel-default-extra-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514622" comment="kernel-devel-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514623" comment="kernel-macros-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514624" comment="kernel-source-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514625" comment="kernel-syms-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514626" comment="kernel-xen-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514627" comment="kernel-xen-devel-3.12.39-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0794" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0794" ref_url="https://www.suse.com/security/cve/CVE-2015-0794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001690.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2022-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00098.html" source="SUSE-SU"/>
    <description>
    modules.d/90crypt/module-setup.sh in the dracut package before 037-17.30.1 in openSUSE 13.2 allows local users to have unspecified impact via a symlink attack on /tmp/dracut_block_uuid.map.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0794/">CVE-2015-0794</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935338">SUSE bug 935338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963976">SUSE bug 963976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515291" comment="dracut-037-51.17.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0921-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
    <description>
    GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<bugzilla href="https://bugzilla.suse.com/927559">SUSE bug 927559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109841" comment="gstreamer-0_10-plugins-bad-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109845" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109846" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109847" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109848" comment="libgstbasevideo-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109849" comment="libgstbasevideo-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109850" comment="libgstcodecparsers-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109852" comment="libgstphotography-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109853" comment="libgstphotography-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109854" comment="libgstsignalprocessor-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109855" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109856" comment="libgstvdp-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109857" comment="libgstvdp-0_10-23-32bit-0.10.23-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142113" comment="gstreamer-0_10-plugins-bad-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142114" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142115" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142116" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142117" comment="libgstbasevideo-0_10-23-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142118" comment="libgstbasevideo-0_10-23-32bit-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142119" comment="libgstcodecparsers-0_10-23-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142120" comment="libgstphotography-0_10-23-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142121" comment="libgstphotography-0_10-23-32bit-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142122" comment="libgstsignalprocessor-0_10-23-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142123" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142124" comment="libgstvdp-0_10-23-0.10.23-20.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142125" comment="libgstvdp-0_10-23-32bit-0.10.23-20.51 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514735" comment="MozillaFirefox-31.7.0esr-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514736" comment="MozillaFirefox-translations-31.7.0esr-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514721" comment="gstreamer-0_10-plugins-bad-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514722" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514723" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514724" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514725" comment="libgstbasevideo-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514726" comment="libgstbasevideo-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514727" comment="libgstcodecparsers-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514728" comment="libgstphotography-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514729" comment="libgstphotography-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514730" comment="libgstsignalprocessor-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514731" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514732" comment="libgstvdp-0_10-23-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514733" comment="libgstvdp-0_10-23-32bit-0.10.23-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334064" comment="gstreamer-plugins-bad is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0799" ref_url="https://www.suse.com/security/cve/CVE-2015-0799" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0799/">CVE-2015-0799</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926166">SUSE bug 926166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0800" ref_url="https://www.suse.com/security/cve/CVE-2015-0800" source="SUSE CVE"/>
    <description>
    The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0800/">CVE-2015-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925401">SUSE bug 925401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514651" comment="MozillaFirefox-31.6.0esr-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514652" comment="MozillaFirefox-translations-31.6.0esr-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0802" ref_url="https://www.suse.com/security/cve/CVE-2015-0802" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0802/">CVE-2015-0802</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925402">SUSE bug 925402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0803" ref_url="https://www.suse.com/security/cve/CVE-2015-0803" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0803/">CVE-2015-0803</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925400">SUSE bug 925400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0804" ref_url="https://www.suse.com/security/cve/CVE-2015-0804" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0804/">CVE-2015-0804</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925400">SUSE bug 925400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0805" ref_url="https://www.suse.com/security/cve/CVE-2015-0805" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 makes an incorrect memset call during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors that trigger rendering of 2D graphics content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0805/">CVE-2015-0805</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925399">SUSE bug 925399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0806" ref_url="https://www.suse.com/security/cve/CVE-2015-0806" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0806/">CVE-2015-0806</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925399">SUSE bug 925399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925398">SUSE bug 925398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514651" comment="MozillaFirefox-31.6.0esr-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514652" comment="MozillaFirefox-translations-31.6.0esr-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0808" ref_url="https://www.suse.com/security/cve/CVE-2015-0808" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 uses incompatible approaches to the deallocation of memory for simple-type arrays, which might allow remote attackers to cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0808/">CVE-2015-0808</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925397">SUSE bug 925397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0810" ref_url="https://www.suse.com/security/cve/CVE-2015-0810" source="SUSE CVE"/>
    <description>
    Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0810/">CVE-2015-0810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0811" ref_url="https://www.suse.com/security/cve/CVE-2015-0811" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0811/">CVE-2015-0811</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925396">SUSE bug 925396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0812" ref_url="https://www.suse.com/security/cve/CVE-2015-0812" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0812/">CVE-2015-0812</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925394">SUSE bug 925394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925393">SUSE bug 925393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514651" comment="MozillaFirefox-31.6.0esr-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514652" comment="MozillaFirefox-translations-31.6.0esr-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925392">SUSE bug 925392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514651" comment="MozillaFirefox-31.6.0esr-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514652" comment="MozillaFirefox-translations-31.6.0esr-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925392">SUSE bug 925392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514651" comment="MozillaFirefox-31.6.0esr-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514652" comment="MozillaFirefox-translations-31.6.0esr-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925395">SUSE bug 925395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514651" comment="MozillaFirefox-31.6.0esr-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514652" comment="MozillaFirefox-translations-31.6.0esr-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html" source="SUSE-SU"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514610" comment="MozillaFirefox-31.5.3esr-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514611" comment="MozillaFirefox-translations-31.5.3esr-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514610" comment="MozillaFirefox-31.5.3esr-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514611" comment="MozillaFirefox-translations-31.5.3esr-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514553" comment="MozillaFirefox-31.5.0esr-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514554" comment="MozillaFirefox-translations-31.5.0esr-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514553" comment="MozillaFirefox-31.5.0esr-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514554" comment="MozillaFirefox-translations-31.5.0esr-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514553" comment="MozillaFirefox-31.5.0esr-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514554" comment="MozillaFirefox-translations-31.5.0esr-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514553" comment="MozillaFirefox-31.5.0esr-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514554" comment="MozillaFirefox-translations-31.5.0esr-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514553" comment="MozillaFirefox-31.5.0esr-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514554" comment="MozillaFirefox-translations-31.5.0esr-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html" source="SUSE-SU"/>
    <description>
    The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114243" comment="libgcrypt20-1.6.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114244" comment="libgcrypt20-32bit-1.6.1-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156955" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156956" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512320" comment="libgcrypt20-1.6.1-16.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512321" comment="libgcrypt20-32bit-1.6.1-16.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514970" comment="libgcrypt20-1.6.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514971" comment="libgcrypt20-32bit-1.6.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333951" comment="gpg2 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0839" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0839" ref_url="https://www.suse.com/security/cve/CVE-2015-0839" source="SUSE CVE"/>
    <description>
    The hp-plugin utility in HP Linux Imaging and Printing (HPLIP) makes it easier for man-in-the-middle attackers to execute arbitrary code by leveraging use of a short GPG key id from a keyserver to verify print plugin downloads.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0839/">CVE-2015-0839</cve>
	<bugzilla href="https://bugzilla.suse.com/933191">SUSE bug 933191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0840" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1058-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00029.html" source="SUSE-SU"/>
    <description>
    The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<bugzilla href="https://bugzilla.suse.com/926749">SUSE bug 926749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141153" comment="update-alternatives-1.18.4-14.216 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1134-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114120" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514965" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0860" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0860" ref_url="https://www.suse.com/security/cve/CVE-2015-0860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00030.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0860/">CVE-2015-0860</cve>
	<bugzilla href="https://bugzilla.suse.com/957160">SUSE bug 957160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517312" comment="update-alternatives-1.16.10-12.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<bugzilla href="https://bugzilla.suse.com/912929">SUSE bug 912929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514813" comment="libpng16-16-1.6.8-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514814" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1038" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001551.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00000.html" source="SUSE-SU"/>
    <description>
    p7zip 9.20.1 allows remote attackers to write to arbitrary files via a symlink attack in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<bugzilla href="https://bugzilla.suse.com/912878">SUSE bug 912878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113958" comment="p7zip-9.20.1-3.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128891" comment="p7zip-9.20.1-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171463" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514933" comment="p7zip-9.20.1-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1071" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1071" ref_url="https://www.suse.com/security/cve/CVE-2015-1071" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1071/">CVE-2015-1071</cve>
	<bugzilla href="https://bugzilla.suse.com/923223">SUSE bug 923223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1076" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1076" ref_url="https://www.suse.com/security/cve/CVE-2015-1076" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1076/">CVE-2015-1076</cve>
	<bugzilla href="https://bugzilla.suse.com/923223">SUSE bug 923223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1081" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1081" ref_url="https://www.suse.com/security/cve/CVE-2015-1081" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1081/">CVE-2015-1081</cve>
	<bugzilla href="https://bugzilla.suse.com/923223">SUSE bug 923223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1083" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1083" ref_url="https://www.suse.com/security/cve/CVE-2015-1083" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1083/">CVE-2015-1083</cve>
	<bugzilla href="https://bugzilla.suse.com/923223">SUSE bug 923223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1120" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1120" ref_url="https://www.suse.com/security/cve/CVE-2015-1120" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1120/">CVE-2015-1120</cve>
	<bugzilla href="https://bugzilla.suse.com/928380">SUSE bug 928380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1122" ref_url="https://www.suse.com/security/cve/CVE-2015-1122" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0761-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1122/">CVE-2015-1122</cve>
	<bugzilla href="https://bugzilla.suse.com/1082221">SUSE bug 1082221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928380">SUSE bug 928380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1127" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1127" ref_url="https://www.suse.com/security/cve/CVE-2015-1127" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-1127/">CVE-2015-1127</cve>
	<bugzilla href="https://bugzilla.suse.com/928380">SUSE bug 928380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151142857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1142857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1142857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1142857" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0703-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00050.html" source="SUSE-SU"/>
    <description>
    On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519012" comment="kernel-firmware-20170530-21.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519013" comment="ucode-amd-20170530-21.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1153" ref_url="https://www.suse.com/security/cve/CVE-2015-1153" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1153/">CVE-2015-1153</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1155" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1155" ref_url="https://www.suse.com/security/cve/CVE-2015-1155" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0761-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1155/">CVE-2015-1155</cve>
	<bugzilla href="https://bugzilla.suse.com/1082221">SUSE bug 1082221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" source="SUSE-SU"/>
    <description>
    The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976653">SUSE bug 976653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514763" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514764" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514765" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514766" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976653">SUSE bug 976653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514763" comment="cups-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514764" comment="cups-client-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514765" comment="cups-libs-1.7.5-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514766" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0650-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0662-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in pigz 2.3.1 allow remote attackers to write to arbitrary files via a (1) full pathname or (2) .. (dot dot) in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191</cve>
	<bugzilla href="https://bugzilla.suse.com/913627">SUSE bug 913627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108432" comment="pigz-2.3-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514630" comment="pigz-2.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html" source="SUSE-SU"/>
    <description>
    GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<bugzilla href="https://bugzilla.suse.com/913678">SUSE bug 913678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915329">SUSE bug 915329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175223" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514744" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1239" ref_url="https://www.suse.com/security/cve/CVE-2015-1239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00091.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the j2k_read_ppm_v3 function in OpenJPEG before r2997, as used in PDFium in Google Chrome, allows remote attackers to cause a denial of service (process crash) via a crafted PDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1239/">CVE-2015-1239</cve>
	<bugzilla href="https://bugzilla.suse.com/1066713">SUSE bug 1066713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520972" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<bugzilla href="https://bugzilla.suse.com/1034050">SUSE bug 1034050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516066" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516067" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516068" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1322" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1322" ref_url="https://www.suse.com/security/cve/CVE-2015-1322" source="SUSE CVE"/>
    <description>
    Directory traversal vulnerability in the Ubuntu network-manager package for Ubuntu (vivid) before 0.9.10.0-4ubuntu15.1, Ubuntu 14.10 before 0.9.8.8-0ubuntu28.1, and Ubuntu 14.04 LTS before 0.9.8.8-0ubuntu7.1 allows local users to change the modem device configuration or read arbitrary files via a .. (dot dot) in the file name in a request to read modem device contexts (com.canonical.NMOfono.ReadImsiContexts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1322/">CVE-2015-1322</cve>
	<bugzilla href="https://bugzilla.suse.com/928972">SUSE bug 928972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333999" comment="NetworkManager is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1328" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1328" ref_url="https://www.suse.com/security/cve/CVE-2015-1328" source="SUSE CVE"/>
    <description>
    The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1328/">CVE-2015-1328</cve>
	<bugzilla href="https://bugzilla.suse.com/934950">SUSE bug 934950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935081">SUSE bug 935081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1333" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1333" ref_url="https://www.suse.com/security/cve/CVE-2015-1333" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1333/">CVE-2015-1333</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185451">SUSE bug 1185451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938645">SUSE bug 938645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1339" ref_url="https://www.suse.com/security/cve/CVE-2015-1339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Memory leak in the cuse_channel_release function in fs/fuse/cuse.c in the Linux kernel before 4.4 allows local users to cause a denial of service (memory consumption) or possibly have unspecified other impact by opening /dev/cuse many times.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1339/">CVE-2015-1339</cve>
	<bugzilla href="https://bugzilla.suse.com/969356">SUSE bug 969356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345</cve>
	<bugzilla href="https://bugzilla.suse.com/914695">SUSE bug 914695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333967" comment="grep is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<bugzilla href="https://bugzilla.suse.com/918330">SUSE bug 918330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514801" comment="bind-libs-9.9.6P1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514802" comment="bind-libs-32bit-9.9.6P1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514803" comment="bind-utils-9.9.6P1-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1350" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
    <description>
    The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1395" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395</cve>
	<bugzilla href="https://bugzilla.suse.com/915328">SUSE bug 915328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175223" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514744" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1396" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
    <description>
    A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<bugzilla href="https://bugzilla.suse.com/915329">SUSE bug 915329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175223" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514744" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1426" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1426" ref_url="https://www.suse.com/security/cve/CVE-2015-1426" source="SUSE CVE"/>
    <description>
    Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to obtains sensitive Amazon EC2 IAM instance metadata by reading a fact for an Amazon EC2 node.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1426/">CVE-2015-1426</cve>
	<bugzilla href="https://bugzilla.suse.com/917383">SUSE bug 917383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334374" comment="facter is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1461" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda's crypter or (2) mew packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916217">SUSE bug 916217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515089" comment="clamav-0.98.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1462" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916214">SUSE bug 916214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515089" comment="clamav-0.98.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1463" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an "incorrect compiler optimization."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916215">SUSE bug 916215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515089" comment="clamav-0.98.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1465" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1465" ref_url="https://www.suse.com/security/cve/CVE-2015-1465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
    <description>
    The IPv4 implementation in the Linux kernel before 3.18.8 does not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allows remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1465/">CVE-2015-1465</cve>
	<bugzilla href="https://bugzilla.suse.com/916225">SUSE bug 916225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514582" comment="glibc-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514583" comment="glibc-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514584" comment="glibc-devel-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514585" comment="glibc-devel-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514586" comment="glibc-i18ndata-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514587" comment="glibc-locale-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514588" comment="glibc-locale-32bit-2.19-20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514589" comment="nscd-2.19-20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473" source="SUSE CVE"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" source="SUSE-SU"/>
    <description>
    The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140870" comment="libldap-2_4-2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140871" comment="libldap-2_4-2-32bit-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140874" comment="openldap2-client-2.4.41-18.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156765" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156766" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156768" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512344" comment="libldap-2_4-2-2.4.41-18.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512345" comment="libldap-2_4-2-32bit-2.4.41-18.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512346" comment="openldap2-client-2.4.41-18.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514779" comment="libldap-2_4-2-2.4.39-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514780" comment="libldap-2_4-2-32bit-2.4.39-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514781" comment="openldap2-client-2.4.39-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140870" comment="libldap-2_4-2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140871" comment="libldap-2_4-2-32bit-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140874" comment="openldap2-client-2.4.41-18.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156765" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156766" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156768" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512344" comment="libldap-2_4-2-2.4.41-18.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512345" comment="libldap-2_4-2-32bit-2.4.41-18.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512346" comment="openldap2-client-2.4.41-18.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514779" comment="libldap-2_4-2-2.4.39-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514780" comment="libldap-2_4-2-32bit-2.4.39-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514781" comment="openldap2-client-2.4.39-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113256" comment="e2fsprogs-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113260" comment="libcom_err2-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113261" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113264" comment="libext2fs2-1.42.11-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158971" comment="e2fsprogs-1.42.11-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158972" comment="libcom_err2-1.42.11-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158973" comment="libcom_err2-32bit-1.42.11-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158974" comment="libext2fs2-1.42.11-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512114" comment="e2fsprogs-1.43.8-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512115" comment="libcom_err2-1.43.8-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512116" comment="libcom_err2-32bit-1.43.8-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512117" comment="libext2fs2-1.43.8-1.19 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514859" comment="e2fsprogs-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514860" comment="libcom_err2-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514861" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514862" comment="libext2fs2-1.42.11-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593</cve>
	<bugzilla href="https://bugzilla.suse.com/1044934">SUSE bug 1044934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2241-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00045.html" source="SUSE-SU"/>
    <description>
    The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159008" comment="gpg2-2.0.24-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159009" comment="gpg2-lang-2.0.24-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512180" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512181" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515353" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515354" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2241-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00045.html" source="SUSE-SU"/>
    <description>
    kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159008" comment="gpg2-2.0.24-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159009" comment="gpg2-lang-2.0.24-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512180" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512181" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515353" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515354" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1774" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1774" ref_url="https://www.suse.com/security/cve/CVE-2015-1774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00015.html" source="SUSE-SU"/>
    <description>
    The HWP filter in LibreOffice before 4.3.7 and 4.4.x before 4.4.2 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted HWP document, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1774/">CVE-2015-1774</cve>
	<bugzilla href="https://bugzilla.suse.com/919409">SUSE bug 919409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515138" comment="apache-commons-logging-1.1.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515139" comment="flute-1.3.0-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515140" comment="libabw-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515141" comment="libbase-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515142" comment="libcdr-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515143" comment="libcmis-0_5-5-0.5.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515144" comment="libe-book-0_1-1-0.1.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515145" comment="libetonyek-0_1-1-0.1.3-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515146" comment="libfonts-1.1.3-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515147" comment="libformula-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515148" comment="libfreehand-0_1-1-0.1.1-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515149" comment="libgltf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515150" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515151" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515152" comment="libhyphen0-2.8.8-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515153" comment="libixion-0_10-0-0.9.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515154" comment="liblangtag1-0.5.7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515155" comment="liblayout-0.2.10-4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515156" comment="libloader-1.1.3-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515157" comment="libmspub-0_1-1-0.1.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515158" comment="libmwaw-0_3-3-0.3.6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515159" comment="libodfgen-0_1-1-0.1.4-3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515160" comment="liborcus-0_8-0-0.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515161" comment="libpagemaker-0_0-0-0.0.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515162" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515163" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515164" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515165" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515166" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515167" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515168" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515169" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515170" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515171" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515172" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515173" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515174" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515175" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515176" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515177" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515178" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515179" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515180" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515181" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515182" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515183" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515184" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515185" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515186" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515187" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515188" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515189" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515190" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515191" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515192" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515193" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515194" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515195" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515196" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515197" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515198" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515199" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515200" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515201" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515202" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515203" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515204" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515205" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515207" comment="libreoffice-voikko-4.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515208" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515209" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515210" comment="librepository-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515211" comment="librevenge-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515212" comment="librevenge-stream-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515213" comment="libserializer-1.1.2-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515214" comment="libvisio-0_1-1-0.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515215" comment="libvoikko1-3.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515216" comment="libwps-0_4-4-0.4.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515217" comment="malaga-suomi-1.18-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515218" comment="myspell-af_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515219" comment="myspell-ar-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515220" comment="myspell-be_BY-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515221" comment="myspell-bg_BG-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515222" comment="myspell-bn_BD-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515223" comment="myspell-bs_BA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515224" comment="myspell-ca-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515225" comment="myspell-cs_CZ-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515226" comment="myspell-da_DK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515227" comment="myspell-de-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515228" comment="myspell-dictionaries-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515229" comment="myspell-el_GR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515230" comment="myspell-en-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515231" comment="myspell-es-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515232" comment="myspell-et_EE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515233" comment="myspell-fr_FR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515234" comment="myspell-gu_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515235" comment="myspell-he_IL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515236" comment="myspell-hi_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515237" comment="myspell-hr_HR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515238" comment="myspell-hu_HU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515239" comment="myspell-it_IT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515240" comment="myspell-lo_LA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515241" comment="myspell-lt_LT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515242" comment="myspell-lv_LV-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515243" comment="myspell-nl_NL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515244" comment="myspell-no-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515245" comment="myspell-pl_PL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515246" comment="myspell-pt_BR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515247" comment="myspell-pt_PT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515248" comment="myspell-ro-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515249" comment="myspell-ru_RU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515250" comment="myspell-sk_SK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515251" comment="myspell-sl_SI-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515252" comment="myspell-sr-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515253" comment="myspell-sv_SE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515254" comment="myspell-te_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515255" comment="myspell-th_TH-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515256" comment="myspell-vi-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515257" comment="myspell-zu_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515258" comment="pentaho-libxml-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515259" comment="pentaho-reporting-flow-engine-0.9.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515260" comment="sac-1.3-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962632">SUSE bug 962632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514693" comment="qemu-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514694" comment="qemu-block-curl-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514695" comment="qemu-ipxe-1.0.0-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514696" comment="qemu-kvm-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514697" comment="qemu-seabios-1.7.4-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514698" comment="qemu-sgabios-8-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514699" comment="qemu-tools-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514700" comment="qemu-vgabios-1.7.4-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514701" comment="qemu-x86-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0955-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00084.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515117" comment="glibc-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515118" comment="glibc-32bit-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515119" comment="glibc-devel-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515120" comment="glibc-devel-32bit-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515121" comment="glibc-i18ndata-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515122" comment="glibc-locale-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515123" comment="glibc-locale-32bit-2.19-22.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515124" comment="nscd-2.19-22.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00057.html" source="SUSE-SU"/>
    <description>
    The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108425" comment="libssh2-1-1.4.3-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108426" comment="libssh2-1-32bit-1.4.3-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514631" comment="libssh2-1-1.4.3-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514632" comment="libssh2-1-32bit-1.4.3-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514789" comment="libopenssl0_9_8-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514790" comment="libopenssl0_9_8-32bit-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514786" comment="libopenssl1_0_0-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514787" comment="libopenssl1_0_0-32bit-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514788" comment="openssl-1.0.1i-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514789" comment="libopenssl0_9_8-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514790" comment="libopenssl0_9_8-32bit-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514786" comment="libopenssl1_0_0-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514787" comment="libopenssl1_0_0-32bit-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514788" comment="openssl-1.0.1i-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514789" comment="libopenssl0_9_8-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514790" comment="libopenssl0_9_8-32bit-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514786" comment="libopenssl1_0_0-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514787" comment="libopenssl1_0_0-32bit-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514788" comment="openssl-1.0.1i-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989464">SUSE bug 989464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514789" comment="libopenssl0_9_8-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514790" comment="libopenssl0_9_8-32bit-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514786" comment="libopenssl1_0_0-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514787" comment="libopenssl1_0_0-32bit-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514788" comment="openssl-1.0.1i-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514789" comment="libopenssl0_9_8-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514790" comment="libopenssl0_9_8-32bit-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514786" comment="libopenssl1_0_0-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514787" comment="libopenssl1_0_0-32bit-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514788" comment="openssl-1.0.1i-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016662" ref_url="https://www.suse.com/support/kb/doc/?id=7016662" source="SUSE-SU"/>
		<reference ref_id="TID7016686" ref_url="https://www.suse.com/support/kb/doc/?id=7016686" source="SUSE-SU"/>
		<reference ref_id="TID7016693" ref_url="https://www.suse.com/support/kb/doc/?id=7016693" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<bugzilla href="https://bugzilla.suse.com/936746">SUSE bug 936746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937637">SUSE bug 937637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1794" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794</cve>
	<bugzilla href="https://bugzilla.suse.com/957984">SUSE bug 957984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1797" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1797" ref_url="https://www.suse.com/security/cve/CVE-2015-1797" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1797/">CVE-2015-1797</cve>
	<bugzilla href="https://bugzilla.suse.com/983901">SUSE bug 983901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0775-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927497">SUSE bug 927497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957163">SUSE bug 957163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514685" comment="ntp-4.2.6p5-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514686" comment="ntp-doc-4.2.6p5-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0775-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927497">SUSE bug 927497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943565">SUSE bug 943565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957163">SUSE bug 957163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962624">SUSE bug 962624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514685" comment="ntp-4.2.6p5-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514686" comment="ntp-doc-4.2.6p5-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
    <description>
    The bdfReadProperties function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 allows remote authenticated users to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a (1) negative or (2) large property count in a BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108654" comment="libXfont1-1.4.7-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514646" comment="libXfont1-1.4.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333972" comment="xorg-x11-libs is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108654" comment="libXfont1-1.4.7-4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514646" comment="libXfont1-1.4.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333972" comment="xorg-x11-libs is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00074.html" source="SUSE-SU"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly perform type conversion for metrics values, which allows remote authenticated users to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561631" comment="libXfont1-1.4.7-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561631" comment="libXfont1-1.4.7-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333972" comment="xorg-x11-libs is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
    <description>
    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-05"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939270">SUSE bug 939270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964732">SUSE bug 964732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517305" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517306" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517307" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141900" comment="libQt5Core5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141901" comment="libQt5DBus5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141902" comment="libQt5Gui5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141903" comment="libQt5Widgets5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159044" comment="libQt5Concurrent5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159045" comment="libQt5Core5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159046" comment="libQt5DBus5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159047" comment="libQt5Gui5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159048" comment="libQt5Network5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159049" comment="libQt5OpenGL5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159050" comment="libQt5PrintSupport5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159051" comment="libQt5Sql5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159052" comment="libQt5Sql5-mysql-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159053" comment="libQt5Sql5-postgresql-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159054" comment="libQt5Sql5-sqlite-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159055" comment="libQt5Sql5-unixODBC-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159056" comment="libQt5Test5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159057" comment="libQt5Widgets5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159058" comment="libQt5Xml5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512213" comment="libQt5Concurrent5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512214" comment="libQt5Core5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512215" comment="libQt5DBus5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512216" comment="libQt5Gui5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512217" comment="libQt5Network5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512218" comment="libQt5OpenGL5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512219" comment="libQt5PrintSupport5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512220" comment="libQt5Sql5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512221" comment="libQt5Sql5-mysql-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512222" comment="libQt5Sql5-postgresql-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512223" comment="libQt5Sql5-sqlite-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512224" comment="libQt5Sql5-unixODBC-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512225" comment="libQt5Test5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512226" comment="libQt5Widgets5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512227" comment="libQt5Xml5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514917" comment="libQt5Core5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514918" comment="libQt5DBus5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514919" comment="libQt5Gui5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514920" comment="libQt5Widgets5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514871" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514872" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514873" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514874" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514875" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514876" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514877" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514878" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514879" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514880" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514881" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514882" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514883" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514884" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514885" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514886" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141900" comment="libQt5Core5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141901" comment="libQt5DBus5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141902" comment="libQt5Gui5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141903" comment="libQt5Widgets5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159044" comment="libQt5Concurrent5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159045" comment="libQt5Core5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159046" comment="libQt5DBus5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159047" comment="libQt5Gui5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159048" comment="libQt5Network5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159049" comment="libQt5OpenGL5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159050" comment="libQt5PrintSupport5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159051" comment="libQt5Sql5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159052" comment="libQt5Sql5-mysql-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159053" comment="libQt5Sql5-postgresql-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159054" comment="libQt5Sql5-sqlite-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159055" comment="libQt5Sql5-unixODBC-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159056" comment="libQt5Test5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159057" comment="libQt5Widgets5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159058" comment="libQt5Xml5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512213" comment="libQt5Concurrent5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512214" comment="libQt5Core5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512215" comment="libQt5DBus5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512216" comment="libQt5Gui5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512217" comment="libQt5Network5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512218" comment="libQt5OpenGL5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512219" comment="libQt5PrintSupport5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512220" comment="libQt5Sql5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512221" comment="libQt5Sql5-mysql-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512222" comment="libQt5Sql5-postgresql-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512223" comment="libQt5Sql5-sqlite-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512224" comment="libQt5Sql5-unixODBC-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512225" comment="libQt5Test5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512226" comment="libQt5Widgets5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512227" comment="libQt5Xml5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514917" comment="libQt5Core5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514918" comment="libQt5DBus5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514919" comment="libQt5Gui5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514920" comment="libQt5Widgets5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514871" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514872" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514873" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514874" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514875" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514876" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514877" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514878" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514879" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514880" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514881" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514882" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514883" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514884" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514885" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514886" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141900" comment="libQt5Core5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141901" comment="libQt5DBus5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141902" comment="libQt5Gui5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141903" comment="libQt5Widgets5-5.3.2-1.81 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159044" comment="libQt5Concurrent5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159045" comment="libQt5Core5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159046" comment="libQt5DBus5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159047" comment="libQt5Gui5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159048" comment="libQt5Network5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159049" comment="libQt5OpenGL5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159050" comment="libQt5PrintSupport5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159051" comment="libQt5Sql5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159052" comment="libQt5Sql5-mysql-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159053" comment="libQt5Sql5-postgresql-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159054" comment="libQt5Sql5-sqlite-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159055" comment="libQt5Sql5-unixODBC-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159056" comment="libQt5Test5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159057" comment="libQt5Widgets5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159058" comment="libQt5Xml5-5.6.2-5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512213" comment="libQt5Concurrent5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512214" comment="libQt5Core5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512215" comment="libQt5DBus5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512216" comment="libQt5Gui5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512217" comment="libQt5Network5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512218" comment="libQt5OpenGL5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512219" comment="libQt5PrintSupport5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512220" comment="libQt5Sql5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512221" comment="libQt5Sql5-mysql-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512222" comment="libQt5Sql5-postgresql-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512223" comment="libQt5Sql5-sqlite-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512224" comment="libQt5Sql5-unixODBC-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512225" comment="libQt5Test5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512226" comment="libQt5Widgets5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512227" comment="libQt5Xml5-5.6.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514917" comment="libQt5Core5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514918" comment="libQt5DBus5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514919" comment="libQt5Gui5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514920" comment="libQt5Widgets5-5.3.1-4.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514871" comment="libqt4-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514872" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514873" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514874" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514875" comment="libqt4-sql-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514876" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514877" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514878" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514879" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514880" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514881" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514882" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514883" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514884" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514885" comment="libqt4-x11-4.8.6-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514886" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927558">SUSE bug 927558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514741" comment="wpa_supplicant-2.2-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1865" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1865" ref_url="https://www.suse.com/security/cve/CVE-2015-1865" source="SUSE CVE"/>
    <description>
    fts.c in coreutils 8.4 allows local users to delete arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1865/">CVE-2015-1865</cve>
	<bugzilla href="https://bugzilla.suse.com/927949">SUSE bug 927949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333935" comment="coreutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1877" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1877" ref_url="https://www.suse.com/security/cve/CVE-2015-1877" source="SUSE CVE"/>
    <description>
    The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-03"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1877/">CVE-2015-1877</cve>
	<bugzilla href="https://bugzilla.suse.com/918836">SUSE bug 918836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334243" comment="xdg-utils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1261-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00041.html" source="SUSE-SU"/>
    <description>
    The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919214">SUSE bug 919214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937096">SUSE bug 937096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937097">SUSE bug 937097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174162" comment="libidn11-1.28-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174163" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516300" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516301" comment="libidn11-32bit-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516356" comment="wget-1.14-10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514619" comment="kernel-default-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514620" comment="kernel-default-devel-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514621" comment="kernel-default-extra-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514622" comment="kernel-devel-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514623" comment="kernel-macros-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514624" comment="kernel-source-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514625" comment="kernel-syms-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514626" comment="kernel-xen-3.12.39-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514627" comment="kernel-xen-devel-3.12.39-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2152" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2152" ref_url="https://www.suse.com/security/cve/CVE-2015-2152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.x and earlier enables certain default backends when emulating a VGA device for an x86 HVM guest qemu even when the configuration disables them, which allows local guest users to obtain access to the VGA console by (1) setting the DISPLAY environment variable, when compiled with SDL support, or connecting to the VNC server on (2) ::1 or (3) 127.0.0.1, when not compiled with SDL support.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2152/">CVE-2015-2152</cve>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919663">SUSE bug 919663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514633" comment="tcpdump-4.5.1-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514633" comment="tcpdump-4.5.1-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514633" comment="tcpdump-4.5.1-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2170" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    The upx decoder in ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514691" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2187" ref_url="https://www.suse.com/security/cve/CVE-2015-2187" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2187/">CVE-2015-2187</cve>
	<bugzilla href="https://bugzilla.suse.com/920695">SUSE bug 920695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<bugzilla href="https://bugzilla.suse.com/920696">SUSE bug 920696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514618" comment="wireshark-1.10.13-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<bugzilla href="https://bugzilla.suse.com/920697">SUSE bug 920697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514618" comment="wireshark-1.10.13-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2190" ref_url="https://www.suse.com/security/cve/CVE-2015-2190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.4 does not properly handle integer data types greater than 32 bits in size, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet that is improperly handled by the LLDP dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2190/">CVE-2015-2190</cve>
	<bugzilla href="https://bugzilla.suse.com/920698">SUSE bug 920698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<bugzilla href="https://bugzilla.suse.com/920699">SUSE bug 920699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514618" comment="wireshark-1.10.13-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2192" ref_url="https://www.suse.com/security/cve/CVE-2015-2192" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2192/">CVE-2015-2192</cve>
	<bugzilla href="https://bugzilla.suse.com/920700">SUSE bug 920700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2221" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514691" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2222" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted petite packed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514691" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2265" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html" source="SUSE-SU"/>
    <description>
    The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allows remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514667" comment="cups-filters-1.0.58-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514668" comment="cups-filters-cups-browsed-1.0.58-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514669" comment="cups-filters-foomatic-rip-1.0.58-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514670" comment="cups-filters-ghostscript-1.0.58-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926396">SUSE bug 926396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141086" comment="python-requests-2.8.1-6.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159273" comment="python-requests-2.8.1-6.16.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517021" comment="python-requests-2.8.1-6.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561558" comment="python-ply-3.4-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512600" comment="python-requests-2.11.1-6.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2304" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0568-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514629" comment="libarchive13-3.1.2-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922022">SUSE bug 922022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922028">SUSE bug 922028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922030">SUSE bug 922030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922043">SUSE bug 922043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922567">SUSE bug 922567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514691" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924961">SUSE bug 924961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.36 mishandles the /(((a\2)|(a*)\g&lt;-1&gt;))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    Late TLS certificate verification in WebKitGTK+ prior to 2.6.6 allows remote attackers to view a secure HTTP request, including, for example, secure cookies.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<bugzilla href="https://bugzilla.suse.com/922895">SUSE bug 922895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001329.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0615-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<bugzilla href="https://bugzilla.suse.com/922894">SUSE bug 922894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923240">SUSE bug 923240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142037" comment="libzip2-0.11.1-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164531" comment="libzip2-0.11.1-13.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514628" comment="libzip2-0.11.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2596" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2596" ref_url="https://www.suse.com/security/cve/CVE-2015-2596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2596/">CVE-2015-2596</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2597" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Install.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951727">SUSE bug 951727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2619" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2627" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to installation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2637" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2638" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2659" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659" source="SUSE CVE"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u45 and Java SE Embedded 8u33 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2664" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2666" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2666" ref_url="https://www.suse.com/security/cve/CVE-2015-2666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2666/">CVE-2015-2666</cve>
	<bugzilla href="https://bugzilla.suse.com/922944">SUSE bug 922944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2668" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514691" comment="clamav-0.98.7-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2675" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2675" ref_url="https://www.suse.com/security/cve/CVE-2015-2675" source="SUSE CVE"/>
    <description>
    The OAuth implementation in librest before 0.7.93 incorrectly truncates the pointer returned by the rest_proxy_call_get_url function, which allows remote attackers to cause a denial of service (application crash) via running the EnsureCredentials method from the org.gnome.OnlineAccounts.Account interface on an object representing a Flickr account.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2675/">CVE-2015-2675</cve>
	<bugzilla href="https://bugzilla.suse.com/923618">SUSE bug 923618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338878" comment="librest is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
    <description>
    The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<bugzilla href="https://bugzilla.suse.com/928978">SUSE bug 928978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1898-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969771">SUSE bug 969771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515131" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515132" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515133" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952189">SUSE bug 952189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515131" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515132" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515133" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515131" comment="krb5-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515132" comment="krb5-32bit-1.12.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515133" comment="krb5-client-1.12.1-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2055-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html" source="SUSE-SU"/>
    <description>
    The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspecified other impact by interacting with an application that calls the gss_export_sec_context function.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-2696.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515382" comment="krb5-1.12.1-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515383" comment="krb5-32bit-1.12.1-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515384" comment="krb5-client-1.12.1-22.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2706" ref_url="https://www.suse.com/security/cve/CVE-2015-2706" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0763-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2706/">CVE-2015-2706</cve>
	<bugzilla href="https://bugzilla.suse.com/928116">SUSE bug 928116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514735" comment="MozillaFirefox-31.7.0esr-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514736" comment="MozillaFirefox-translations-31.7.0esr-34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514735" comment="MozillaFirefox-31.7.0esr-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514736" comment="MozillaFirefox-translations-31.7.0esr-34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514735" comment="MozillaFirefox-31.7.0esr-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514736" comment="MozillaFirefox-translations-31.7.0esr-34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514735" comment="MozillaFirefox-31.7.0esr-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514736" comment="MozillaFirefox-translations-31.7.0esr-34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514735" comment="MozillaFirefox-31.7.0esr-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514736" comment="MozillaFirefox-translations-31.7.0esr-34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2751" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 4.3.x, 4.4.x, and 4.5.x, when using toolstack disaggregation, allows remote domains with partial management control to cause a denial of service (host lock) via unspecified domctl operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514705" comment="xen-4.4.2_04-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514706" comment="xen-kmp-default-4.4.2_04_k3.12.39_47-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514707" comment="xen-libs-4.4.2_04-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514708" comment="xen-libs-32bit-4.4.2_04-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2752" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2752" ref_url="https://www.suse.com/security/cve/CVE-2015-2752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2752/">CVE-2015-2752</cve>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514705" comment="xen-4.4.2_04-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514706" comment="xen-kmp-default-4.4.2_04_k3.12.39_47-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514707" comment="xen-libs-4.4.2_04-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514708" comment="xen-libs-32bit-4.4.2_04-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514647" comment="xen-4.4.2_02-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514648" comment="xen-kmp-default-4.4.2_02_k3.12.38_44-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514649" comment="xen-libs-4.4.2_02-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514650" comment="xen-libs-32bit-4.4.2_02-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00010.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009109692" comment="libtasn1-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109693" comment="libtasn1-6-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109694" comment="libtasn1-6-32bit-3.7-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159215" comment="libtasn1-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159216" comment="libtasn1-6-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159217" comment="libtasn1-6-32bit-4.9-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170495" comment="libtasn1-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170496" comment="libtasn1-6-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170497" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514702" comment="libtasn1-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514703" comment="libtasn1-6-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514704" comment="libtasn1-6-32bit-3.7-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7017143" ref_url="https://www.suse.com/support/kb/doc/?id=7017143" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<bugzilla href="https://bugzilla.suse.com/925378">SUSE bug 925378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2924" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924" source="SUSE CVE"/>
    <description>
    The receive_ra function in rdisc/nm-lndp-rdisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in NetworkManager 1.x allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message, a similar issue to CVE-2015-2922.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142074" comment="NetworkManager-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142075" comment="NetworkManager-lang-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140431" comment="libnm-glib-vpn1-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140432" comment="libnm-glib4-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140433" comment="libnm-util2-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140434" comment="libnm0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142076" comment="typelib-1_0-NM-1_0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140435" comment="typelib-1_0-NMClient-1_0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140436" comment="typelib-1_0-NetworkManager-1_0-1.0.12-8.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159624" comment="NetworkManager-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159625" comment="NetworkManager-lang-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159169" comment="libnm-glib-vpn1-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159170" comment="libnm-glib4-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159171" comment="libnm-util2-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159172" comment="libnm0-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159626" comment="typelib-1_0-NM-1_0-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159173" comment="typelib-1_0-NMClient-1_0-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159174" comment="typelib-1_0-NetworkManager-1_0-1.0.12-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512013" comment="NetworkManager-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512014" comment="NetworkManager-lang-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512015" comment="libnm-glib-vpn1-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512016" comment="libnm-glib4-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512017" comment="libnm-util2-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512018" comment="libnm0-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512019" comment="typelib-1_0-NM-1_0-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512020" comment="typelib-1_0-NMClient-1_0-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512021" comment="typelib-1_0-NetworkManager-1_0-1.0.12-13.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2925" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2925" ref_url="https://www.suse.com/security/cve/CVE-2015-2925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2925/">CVE-2015-2925</cve>
	<bugzilla href="https://bugzilla.suse.com/926238">SUSE bug 926238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951625">SUSE bug 951625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516145" comment="kernel-default-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516146" comment="kernel-default-devel-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516147" comment="kernel-default-extra-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516148" comment="kernel-devel-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516149" comment="kernel-macros-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516150" comment="kernel-source-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516151" comment="kernel-syms-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516152" comment="kernel-xen-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516153" comment="kernel-xen-devel-3.12.51-60.20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3038" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3038" ref_url="https://www.suse.com/security/cve/CVE-2015-3038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3038/">CVE-2015-3038</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3039" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3039" ref_url="https://www.suse.com/security/cve/CVE-2015-3039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-0358.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3039/">CVE-2015-3039</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3040" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3040" ref_url="https://www.suse.com/security/cve/CVE-2015-3040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-0357.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3040/">CVE-2015-3040</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3041" ref_url="https://www.suse.com/security/cve/CVE-2015-3041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3041/">CVE-2015-3041</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3042" ref_url="https://www.suse.com/security/cve/CVE-2015-3042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3042/">CVE-2015-3042</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3043" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3043" ref_url="https://www.suse.com/security/cve/CVE-2015-3043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3043/">CVE-2015-3043</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3044" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3044" ref_url="https://www.suse.com/security/cve/CVE-2015-3044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3044/">CVE-2015-3044</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3077" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3077" ref_url="https://www.suse.com/security/cve/CVE-2015-3077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3084 and CVE-2015-3086.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3077/">CVE-2015-3077</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3078" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3078" ref_url="https://www.suse.com/security/cve/CVE-2015-3078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3089, CVE-2015-3090, and CVE-2015-3093.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3078/">CVE-2015-3078</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3079" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3079" ref_url="https://www.suse.com/security/cve/CVE-2015-3079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3079/">CVE-2015-3079</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3080" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3080" ref_url="https://www.suse.com/security/cve/CVE-2015-3080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3080/">CVE-2015-3080</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3081" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3081" ref_url="https://www.suse.com/security/cve/CVE-2015-3081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Race condition in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to bypass the Internet Explorer Protected Mode protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3081/">CVE-2015-3081</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3082" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3082" ref_url="https://www.suse.com/security/cve/CVE-2015-3082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3083 and CVE-2015-3085.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3082/">CVE-2015-3082</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3083" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3083" ref_url="https://www.suse.com/security/cve/CVE-2015-3083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3083/">CVE-2015-3083</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3084" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3084" ref_url="https://www.suse.com/security/cve/CVE-2015-3084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3086.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3084/">CVE-2015-3084</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3085" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3085" ref_url="https://www.suse.com/security/cve/CVE-2015-3085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3083.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3085/">CVE-2015-3085</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3086" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3086" ref_url="https://www.suse.com/security/cve/CVE-2015-3086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3084.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3086/">CVE-2015-3086</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3087" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3087" ref_url="https://www.suse.com/security/cve/CVE-2015-3087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3087/">CVE-2015-3087</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3088" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3088" ref_url="https://www.suse.com/security/cve/CVE-2015-3088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3088/">CVE-2015-3088</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3089" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3089" ref_url="https://www.suse.com/security/cve/CVE-2015-3089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3090, and CVE-2015-3093.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3089/">CVE-2015-3089</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3090" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3090" ref_url="https://www.suse.com/security/cve/CVE-2015-3090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3093.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3090/">CVE-2015-3090</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3091" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3091" ref_url="https://www.suse.com/security/cve/CVE-2015-3091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3092.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3091/">CVE-2015-3091</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3092" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3092" ref_url="https://www.suse.com/security/cve/CVE-2015-3092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3091.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3092/">CVE-2015-3092</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3093" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3093" ref_url="https://www.suse.com/security/cve/CVE-2015-3093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3090.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3093/">CVE-2015-3093</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3096" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3096" ref_url="https://www.suse.com/security/cve/CVE-2015-3096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass a CVE-2014-5333 protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3096/">CVE-2015-3096</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3098" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3098" ref_url="https://www.suse.com/security/cve/CVE-2015-3098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3099 and CVE-2015-3102.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3098/">CVE-2015-3098</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3099" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3099" ref_url="https://www.suse.com/security/cve/CVE-2015-3099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3102.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3099/">CVE-2015-3099</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3100" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3100" ref_url="https://www.suse.com/security/cve/CVE-2015-3100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3100/">CVE-2015-3100</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3102" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3102" ref_url="https://www.suse.com/security/cve/CVE-2015-3102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3099.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3102/">CVE-2015-3102</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3103" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3103" ref_url="https://www.suse.com/security/cve/CVE-2015-3103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3106 and CVE-2015-3107.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3103/">CVE-2015-3103</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3104" ref_url="https://www.suse.com/security/cve/CVE-2015-3104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3104/">CVE-2015-3104</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3105" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3105" ref_url="https://www.suse.com/security/cve/CVE-2015-3105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3105/">CVE-2015-3105</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3106" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3106" ref_url="https://www.suse.com/security/cve/CVE-2015-3106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3107.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3106/">CVE-2015-3106</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3107" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3106.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3108" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3108" ref_url="https://www.suse.com/security/cve/CVE-2015-3108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3108/">CVE-2015-3108</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3113" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3113" ref_url="https://www.suse.com/security/cve/CVE-2015-3113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001459.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00002.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3113/">CVE-2015-3113</cve>
	<bugzilla href="https://bugzilla.suse.com/935701">SUSE bug 935701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514784" comment="flash-player-11.2.202.468-89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514785" comment="flash-player-gnome-11.2.202.468-89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3114" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3114" ref_url="https://www.suse.com/security/cve/CVE-2015-3114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3114/">CVE-2015-3114</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3115" ref_url="https://www.suse.com/security/cve/CVE-2015-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3116, CVE-2015-3125, and CVE-2015-5116.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3115/">CVE-2015-3115</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3116" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3116" ref_url="https://www.suse.com/security/cve/CVE-2015-3116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3125, and CVE-2015-5116.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3116/">CVE-2015-3116</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3117" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3117" ref_url="https://www.suse.com/security/cve/CVE-2015-3117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3117/">CVE-2015-3117</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3118" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3118" ref_url="https://www.suse.com/security/cve/CVE-2015-3118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3118/">CVE-2015-3118</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3119" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3119" ref_url="https://www.suse.com/security/cve/CVE-2015-3119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, and CVE-2015-4433.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3119/">CVE-2015-3119</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3120" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3120" ref_url="https://www.suse.com/security/cve/CVE-2015-3120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3121, CVE-2015-3122, and CVE-2015-4433.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3120/">CVE-2015-3120</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3121" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3121" ref_url="https://www.suse.com/security/cve/CVE-2015-3121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3120, CVE-2015-3122, and CVE-2015-4433.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3121/">CVE-2015-3121</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3122" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3122" ref_url="https://www.suse.com/security/cve/CVE-2015-3122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, and CVE-2015-4433.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3122/">CVE-2015-3122</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3123" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3123" ref_url="https://www.suse.com/security/cve/CVE-2015-3123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3123/">CVE-2015-3123</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3124" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3124" ref_url="https://www.suse.com/security/cve/CVE-2015-3124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3124/">CVE-2015-3124</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3125" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3125" ref_url="https://www.suse.com/security/cve/CVE-2015-3125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-5116.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3125/">CVE-2015-3125</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3126" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3126" ref_url="https://www.suse.com/security/cve/CVE-2015-3126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-4429.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3126/">CVE-2015-3126</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3127" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3127" ref_url="https://www.suse.com/security/cve/CVE-2015-3127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3127/">CVE-2015-3127</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3128" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3128" ref_url="https://www.suse.com/security/cve/CVE-2015-3128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3128/">CVE-2015-3128</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3129" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3129" ref_url="https://www.suse.com/security/cve/CVE-2015-3129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3129/">CVE-2015-3129</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3130" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3130" ref_url="https://www.suse.com/security/cve/CVE-2015-3130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3130/">CVE-2015-3130</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3131" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3131" ref_url="https://www.suse.com/security/cve/CVE-2015-3131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3131/">CVE-2015-3131</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3132" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3132" ref_url="https://www.suse.com/security/cve/CVE-2015-3132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3132/">CVE-2015-3132</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3133" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3133" ref_url="https://www.suse.com/security/cve/CVE-2015-3133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3133/">CVE-2015-3133</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3134" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3134" ref_url="https://www.suse.com/security/cve/CVE-2015-3134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3134/">CVE-2015-3134</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3135" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3135" ref_url="https://www.suse.com/security/cve/CVE-2015-3135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-4432 and CVE-2015-5118.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3135/">CVE-2015-3135</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3136" ref_url="https://www.suse.com/security/cve/CVE-2015-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3136/">CVE-2015-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3137" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3137" ref_url="https://www.suse.com/security/cve/CVE-2015-3137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3137/">CVE-2015-3137</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    print-wb.c in tcpdump before 4.7.4 allows remote attackers to cause a denial of service (segmentation fault and process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<bugzilla href="https://bugzilla.suse.com/927637">SUSE bug 927637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333975" comment="tcpdump is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514738" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514739" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514740" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<bugzilla href="https://bugzilla.suse.com/927608">SUSE bug 927608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514738" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514739" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514740" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<bugzilla href="https://bugzilla.suse.com/927607">SUSE bug 927607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514738" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514739" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514740" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3146" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0860-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<bugzilla href="https://bugzilla.suse.com/928323">SUSE bug 928323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515036" comment="libssh4-0.6.3-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<bugzilla href="https://bugzilla.suse.com/1092962">SUSE bug 1092962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514738" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514739" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514740" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<bugzilla href="https://bugzilla.suse.com/1037590">SUSE bug 1037590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936407">SUSE bug 936407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<bugzilla href="https://bugzilla.suse.com/928533">SUSE bug 928533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514738" comment="curl-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514739" comment="libcurl4-7.37.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514740" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00044.html" source="SUSE-SU"/>
    <description>
    The authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<bugzilla href="https://bugzilla.suse.com/1177201">SUSE bug 1177201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934102">SUSE bug 934102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514809" comment="libecpg6-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514810" comment="libpq5-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514811" comment="libpq5-32bit-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514812" comment="postgresql93-9.3.8-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514809" comment="libecpg6-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514810" comment="libpq5-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514811" comment="libpq5-32bit-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514812" comment="postgresql93-9.3.8-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    contrib/pgcrypto in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 uses different error responses when an incorrect key is used, which makes it easier for attackers to obtain the key via a brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514809" comment="libecpg6-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514810" comment="libpq5-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514811" comment="libpq5-32bit-9.3.8-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514812" comment="postgresql93-9.3.8-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
    <description>
    The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<bugzilla href="https://bugzilla.suse.com/1022086">SUSE bug 1022086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960151">SUSE bug 960151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7017046" ref_url="https://www.suse.com/support/kb/doc/?id=7017046" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1327-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
    <description>
    crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515375" comment="libopenssl1_0_0-1.0.1i-27.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515376" comment="libopenssl1_0_0-32bit-1.0.1i-27.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515377" comment="openssl-1.0.1i-27.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516142" comment="libopenssl1_0_0-1.0.1i-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516143" comment="libopenssl1_0_0-32bit-1.0.1i-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516144" comment="openssl-1.0.1i-36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017047" ref_url="https://www.suse.com/support/kb/doc/?id=7017047" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1327-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00073.html" source="SUSE-SU"/>
    <description>
    The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963977">SUSE bug 963977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514541" comment="libopenssl0_9_8-0.9.8j-87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514542" comment="libopenssl0_9_8-32bit-0.9.8j-87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515375" comment="libopenssl1_0_0-1.0.1i-27.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515376" comment="libopenssl1_0_0-32bit-1.0.1i-27.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515377" comment="openssl-1.0.1i-27.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514541" comment="libopenssl0_9_8-0.9.8j-87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514542" comment="libopenssl0_9_8-32bit-0.9.8j-87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516142" comment="libopenssl1_0_0-1.0.1i-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516143" comment="libopenssl1_0_0-32bit-1.0.1i-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516144" comment="openssl-1.0.1i-36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
    <description>
    ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515375" comment="libopenssl1_0_0-1.0.1i-27.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515376" comment="libopenssl1_0_0-32bit-1.0.1i-27.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515377" comment="openssl-1.0.1i-27.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516142" comment="libopenssl1_0_0-1.0.1i-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516143" comment="libopenssl1_0_0-32bit-1.0.1i-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516144" comment="openssl-1.0.1i-36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0362-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0442-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0997-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1003-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00007.html" source="SUSE-SU"/>
    <description>
    fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512133" comment="fuse-2.9.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512134" comment="libfuse2-2.9.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514768" comment="fuse-2.9.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514769" comment="libfuse2-2.9.3-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932823">SUSE bug 932823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514972" comment="qemu-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514973" comment="qemu-block-curl-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514974" comment="qemu-ipxe-1.0.0-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514975" comment="qemu-kvm-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514976" comment="qemu-seabios-1.7.4-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514977" comment="qemu-sgabios-8-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514978" comment="qemu-tools-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514979" comment="qemu-vgabios-1.7.4-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514980" comment="qemu-x86-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514757" comment="xen-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514758" comment="xen-kmp-default-4.4.2_06_k3.12.39_47-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514759" comment="xen-libs-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514760" comment="xen-libs-32bit-4.4.2_06-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P&lt;B&gt;c)(?P&lt;B&gt;a(?P=B)))&gt;WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3212" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3212" ref_url="https://www.suse.com/security/cve/CVE-2015-3212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3212/">CVE-2015-3212</cve>
	<bugzilla href="https://bugzilla.suse.com/936502">SUSE bug 936502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
    <description>
    The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214</cve>
	<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936025">SUSE bug 936025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3216" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
    <description>
    Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514789" comment="libopenssl0_9_8-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514790" comment="libopenssl0_9_8-32bit-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514786" comment="libopenssl1_0_0-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514787" comment="libopenssl1_0_0-32bit-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514788" comment="openssl-1.0.1i-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3218" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<bugzilla href="https://bugzilla.suse.com/933922">SUSE bug 933922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115371" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115372" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115373" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115376" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515105" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515106" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515107" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515108" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
    <description>
    The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140715" comment="libldb1-1.1.26-10.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140716" comment="libldb1-32bit-1.1.26-10.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159154" comment="libldb1-1.1.29-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159155" comment="libldb1-32bit-1.1.29-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512347" comment="libldb1-1.1.29-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512348" comment="libldb1-32bit-1.1.29-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515385" comment="libdcerpc-binding0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515386" comment="libdcerpc-binding0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515387" comment="libdcerpc0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515388" comment="libdcerpc0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515389" comment="libgensec0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515390" comment="libgensec0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515391" comment="libldb1-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515392" comment="libldb1-32bit-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515393" comment="libndr-krb5pac0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515394" comment="libndr-krb5pac0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515395" comment="libndr-nbt0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515396" comment="libndr-nbt0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515397" comment="libndr-standard0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515398" comment="libndr-standard0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515399" comment="libndr0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515400" comment="libndr0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515401" comment="libnetapi0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515402" comment="libnetapi0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515403" comment="libpdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515404" comment="libpdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515405" comment="libregistry0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515406" comment="libsamba-credentials0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515407" comment="libsamba-credentials0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515408" comment="libsamba-hostconfig0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515409" comment="libsamba-hostconfig0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515410" comment="libsamba-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515411" comment="libsamba-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515412" comment="libsamdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515413" comment="libsamdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515414" comment="libsmbclient-raw0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515415" comment="libsmbclient-raw0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515416" comment="libsmbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515417" comment="libsmbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515418" comment="libsmbconf0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515419" comment="libsmbconf0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515420" comment="libsmbldap0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515421" comment="libsmbldap0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515422" comment="libtalloc2-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515423" comment="libtalloc2-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515424" comment="libtdb1-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515425" comment="libtdb1-32bit-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515426" comment="libtevent-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515427" comment="libtevent-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515428" comment="libtevent0-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515429" comment="libtevent0-32bit-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515430" comment="libwbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515431" comment="libwbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515432" comment="pytalloc-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515433" comment="pytalloc-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515434" comment="samba-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515435" comment="samba-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515436" comment="samba-client-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515437" comment="samba-client-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515438" comment="samba-doc-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515439" comment="samba-libs-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515440" comment="samba-libs-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515441" comment="samba-winbind-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515442" comment="samba-winbind-32bit-4.1.12-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516154" comment="libdcerpc-binding0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516155" comment="libdcerpc-binding0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516156" comment="libdcerpc0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516157" comment="libdcerpc0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516158" comment="libgensec0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516159" comment="libgensec0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516160" comment="libldb1-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516161" comment="libldb1-32bit-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516162" comment="libndr-krb5pac0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516163" comment="libndr-krb5pac0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516164" comment="libndr-nbt0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516165" comment="libndr-nbt0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516166" comment="libndr-standard0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516167" comment="libndr-standard0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516168" comment="libndr0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516169" comment="libndr0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516170" comment="libnetapi0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516171" comment="libnetapi0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516172" comment="libregistry0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516173" comment="libsamba-credentials0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516174" comment="libsamba-credentials0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516175" comment="libsamba-hostconfig0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516176" comment="libsamba-hostconfig0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516177" comment="libsamba-passdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516178" comment="libsamba-passdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516179" comment="libsamba-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516180" comment="libsamba-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516181" comment="libsamdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516182" comment="libsamdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516183" comment="libsmbclient-raw0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516184" comment="libsmbclient-raw0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516185" comment="libsmbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516186" comment="libsmbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516187" comment="libsmbconf0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516188" comment="libsmbconf0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516189" comment="libsmbldap0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516190" comment="libsmbldap0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516191" comment="libtalloc2-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516192" comment="libtalloc2-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516193" comment="libtdb1-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516194" comment="libtdb1-32bit-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516195" comment="libtevent-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516196" comment="libtevent-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516197" comment="libtevent0-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516198" comment="libtevent0-32bit-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516199" comment="libwbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516200" comment="libwbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516201" comment="pytalloc-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516202" comment="pytalloc-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516203" comment="samba-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516204" comment="samba-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516205" comment="samba-client-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516206" comment="samba-client-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516207" comment="samba-doc-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516208" comment="samba-libs-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516209" comment="samba-libs-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516210" comment="samba-winbind-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516211" comment="samba-winbind-32bit-4.2.4-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3228" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1352-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125321" comment="ghostscript-9.15-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125322" comment="ghostscript-x11-9.15-6.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515909" comment="ghostscript-9.15-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515910" comment="ghostscript-x11-9.15-6.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00054.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236</cve>
	<bugzilla href="https://bugzilla.suse.com/934501">SUSE bug 934501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00054.html" source="SUSE-SU"/>
    <description>
    The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237</cve>
	<bugzilla href="https://bugzilla.suse.com/934502">SUSE bug 934502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
    <description>
    The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<bugzilla href="https://bugzilla.suse.com/1123794">SUSE bug 1123794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512585" comment="pam-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512586" comment="pam-32bit-1.1.8-24.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512587" comment="pam-doc-1.1.8-24.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517449" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517450" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517451" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1245-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00022.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the dwarf_to_unw_regnum function in include/dwarf_i.h in libunwind 1.1 allows local users to have unspecified impact via invalid dwarf opcodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239</cve>
	<bugzilla href="https://bugzilla.suse.com/1122012">SUSE bug 1122012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521604" comment="libunwind-1.1-11.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3243" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1937-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00001.html" source="SUSE-SU"/>
    <description>
    rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243</cve>
	<bugzilla href="https://bugzilla.suse.com/1098851">SUSE bug 1098851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126233">SUSE bug 1126233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935393">SUSE bug 935393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512617" comment="rsyslog-8.24.0-3.16.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519800" comment="rsyslog-8.24.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1566-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1750-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<bugzilla href="https://bugzilla.suse.com/944460">SUSE bug 944460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142017" comment="libspice-server1-0.12.5-2.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515060" comment="libspice-server1-0.12.4-8.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3255" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<bugzilla href="https://bugzilla.suse.com/939246">SUSE bug 939246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115371" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115372" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115373" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115376" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515105" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515106" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515107" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515108" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3256" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115371" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115372" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115373" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115376" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515105" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515106" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515107" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515108" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the WriteProlog function in filter/texttopdf.c in texttopdf in cups-filters before 1.0.70 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a small line size in a print job.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514907" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514908" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514909" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514910" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514838" comment="xen-4.4.2_08-22.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514839" comment="xen-kmp-default-4.4.2_08_k3.12.43_52.6-22.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514840" comment="xen-libs-4.4.2_08-22.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514841" comment="xen-libs-32bit-4.4.2_08-22.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3276" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3276" ref_url="https://www.suse.com/security/cve/CVE-2015-3276" source="SUSE CVE"/>
    <description>
    The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3276/">CVE-2015-3276</cve>
	<bugzilla href="https://bugzilla.suse.com/938567">SUSE bug 938567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336726" comment="openldap2-client is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3277" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3277" ref_url="https://www.suse.com/security/cve/CVE-2015-3277" source="SUSE CVE"/>
    <description>
    The mod_nss module before 1.0.11 in Fedora allows remote attackers to obtain cipher lists due to incorrect parsing of multi-keyword cipherstring.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3277/">CVE-2015-3277</cve>
	<bugzilla href="https://bugzilla.suse.com/938567">SUSE bug 938567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336726" comment="openldap2-client is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3278" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3278" ref_url="https://www.suse.com/security/cve/CVE-2015-3278" source="SUSE CVE"/>
    <description>
    The cipherstring parsing code in nss_compat_ossl while in multi-keyword mode does not match the expected set of ciphers for a given cipher combination, which allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3278/">CVE-2015-3278</cve>
	<bugzilla href="https://bugzilla.suse.com/938571">SUSE bug 938571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514907" comment="cups-filters-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514908" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514909" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514910" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288</cve>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3290" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3290" ref_url="https://www.suse.com/security/cve/CVE-2015-3290" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3290/">CVE-2015-3290</cve>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939269">SUSE bug 939269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3291" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3291" ref_url="https://www.suse.com/security/cve/CVE-2015-3291" source="SUSE CVE"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3291/">CVE-2015-3291</cve>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3294" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0979-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00013.html" source="SUSE-SU"/>
    <description>
    The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<bugzilla href="https://bugzilla.suse.com/923144">SUSE bug 923144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928867">SUSE bug 928867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140541" comment="dnsmasq-2.71-10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141859" comment="dnsmasq-2.71-8.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158964" comment="dnsmasq-2.76-17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514737" comment="dnsmasq-2.71-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3308" ref_url="https://www.suse.com/security/cve/CVE-2015-3308" source="SUSE CVE"/>
    <description>
    Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3308/">CVE-2015-3308</cve>
	<bugzilla href="https://bugzilla.suse.com/927411">SUSE bug 927411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00147.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148440" comment="ppp-2.4.7-3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517109" comment="ppp-2.4.7-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331</cve>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931231">SUSE bug 931231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939262">SUSE bug 939262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3332" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3332" ref_url="https://www.suse.com/security/cve/CVE-2015-3332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
    <description>
    A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3332/">CVE-2015-3332</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928135">SUSE bug 928135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939263">SUSE bug 939263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514705" comment="xen-4.4.2_04-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514706" comment="xen-kmp-default-4.4.2_04_k3.12.39_47-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514707" comment="xen-libs-4.4.2_04-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514708" comment="xen-libs-32bit-4.4.2_04-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.html" source="SUSE-SU"/>
    <description>
    ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514685" comment="ntp-4.2.6p5-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514686" comment="ntp-doc-4.2.6p5-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&amp;O&gt;O) in a CREATE TABLE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001456.html" source="SUSE-SU"/>
    <description>
    The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514782" comment="xorg-x11-server-7.6_1.15.2-28.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514783" comment="xorg-x11-server-extra-7.6_1.15.2-28.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3451" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001553.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00006.html" source="SUSE-SU"/>
    <description>
    The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<bugzilla href="https://bugzilla.suse.com/929237">SUSE bug 929237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113959" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169826" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514935" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0889-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0889-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="TID7016497" ref_url="https://www.suse.com/support/kb/doc?id=7016497" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html" source="SUSE-SU"/>
    <description>
    The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935900">SUSE bug 935900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514693" comment="qemu-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514694" comment="qemu-block-curl-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514695" comment="qemu-ipxe-1.0.0-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514696" comment="qemu-kvm-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514697" comment="qemu-seabios-1.7.4-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514698" comment="qemu-sgabios-8-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514699" comment="qemu-tools-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514700" comment="qemu-vgabios-1.7.4-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514701" comment="qemu-x86-2.0.2-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514705" comment="xen-4.4.2_04-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514706" comment="xen-kmp-default-4.4.2_04_k3.12.39_47-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514707" comment="xen-libs-4.4.2_04-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514708" comment="xen-libs-32bit-4.4.2_04-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" source="SUSE-SU"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516106" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516107" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516108" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159215" comment="libtasn1-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159216" comment="libtasn1-6-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159217" comment="libtasn1-6-32bit-4.9-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170495" comment="libtasn1-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170496" comment="libtasn1-6-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170497" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514981" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514982" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514983" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516106" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516107" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516108" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636</cve>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939277">SUSE bug 939277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994624">SUSE bug 994624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3658" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3658" ref_url="https://www.suse.com/security/cve/CVE-2015-3658" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3658/">CVE-2015-3658</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3659" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659</cve>
	<bugzilla href="https://bugzilla.suse.com/936835">SUSE bug 936835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936836">SUSE bug 936836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3717" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3717" ref_url="https://www.suse.com/security/cve/CVE-2015-3717" source="SUSE CVE"/>
    <description>
    Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3717/">CVE-2015-3717</cve>
	<bugzilla href="https://bugzilla.suse.com/936836">SUSE bug 936836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3727" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3727" ref_url="https://www.suse.com/security/cve/CVE-2015-3727" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3727/">CVE-2015-3727</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3731" ref_url="https://www.suse.com/security/cve/CVE-2015-3731" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3731/">CVE-2015-3731</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3741" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3741" ref_url="https://www.suse.com/security/cve/CVE-2015-3741" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3741/">CVE-2015-3741</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3743" ref_url="https://www.suse.com/security/cve/CVE-2015-3743" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3743/">CVE-2015-3743</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3745" ref_url="https://www.suse.com/security/cve/CVE-2015-3745" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3745/">CVE-2015-3745</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3747" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3747" ref_url="https://www.suse.com/security/cve/CVE-2015-3747" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3747/">CVE-2015-3747</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3748" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3748" ref_url="https://www.suse.com/security/cve/CVE-2015-3748" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3748/">CVE-2015-3748</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3749" ref_url="https://www.suse.com/security/cve/CVE-2015-3749" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3749/">CVE-2015-3749</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3752" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3752" ref_url="https://www.suse.com/security/cve/CVE-2015-3752" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3752/">CVE-2015-3752</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514767" comment="wireshark-1.10.14-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514767" comment="wireshark-1.10.14-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514767" comment="wireshark-1.10.14-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3885" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3885" ref_url="https://www.suse.com/security/cve/CVE-2015-3885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0931-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3885/">CVE-2015-3885</cve>
	<bugzilla href="https://bugzilla.suse.com/930683">SUSE bug 930683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3900" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900</cve>
	<bugzilla href="https://bugzilla.suse.com/936032">SUSE bug 936032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517305" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517306" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517307" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3991" ref_url="https://www.suse.com/security/cve/CVE-2015-3991" source="SUSE CVE"/>
    <description>
    strongSwan 5.2.2 and 5.3.0 allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3991/">CVE-2015-3991</cve>
	<bugzilla href="https://bugzilla.suse.com/931272">SUSE bug 931272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333984" comment="strongswan is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004209.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016528" ref_url="https://www.suse.com/support/kb/doc/?id=7016528" source="SUSE-SU"/>
		<reference ref_id="TID7016529" ref_url="https://www.suse.com/support/kb/doc?id=7016529" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016657" ref_url="https://www.suse.com/support/kb/doc/?id=7016657" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7016726" ref_url="https://www.suse.com/support/kb/doc/?id=7016726" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021978" ref_url="https://www.suse.com/support/kb/doc/?id=7021978" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022026" ref_url="https://www.suse.com/support/kb/doc/?id=7022026" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1684-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0478-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2267-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00034.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931600">SUSE bug 931600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931723">SUSE bug 931723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937202">SUSE bug 937202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938905">SUSE bug 938905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938913">SUSE bug 938913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943664">SUSE bug 943664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944729">SUSE bug 944729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955589">SUSE bug 955589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980406">SUSE bug 980406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515720" comment="libldap-2_4-2-2.4.41-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515721" comment="libldap-2_4-2-32bit-2.4.41-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515722" comment="openldap2-client-2.4.41-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515772" comment="socat-1.7.2.4-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515720" comment="libldap-2_4-2-2.4.41-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515721" comment="libldap-2_4-2-32bit-2.4.41-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514789" comment="libopenssl0_9_8-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514790" comment="libopenssl0_9_8-32bit-0.9.8j-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514786" comment="libopenssl1_0_0-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514787" comment="libopenssl1_0_0-32bit-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515722" comment="openldap2-client-2.4.41-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514987" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514988" comment="openssh-askpass-gnome-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514989" comment="openssh-helpers-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514788" comment="openssl-1.0.1i-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515772" comment="socat-1.7.2.4-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4001" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4001" ref_url="https://www.suse.com/security/cve/CVE-2015-4001" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4001/">CVE-2015-4001</cve>
	<bugzilla href="https://bugzilla.suse.com/933934">SUSE bug 933934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4002" ref_url="https://www.suse.com/security/cve/CVE-2015-4002" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4002/">CVE-2015-4002</cve>
	<bugzilla href="https://bugzilla.suse.com/933934">SUSE bug 933934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4003" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4003" ref_url="https://www.suse.com/security/cve/CVE-2015-4003" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4003/">CVE-2015-4003</cve>
	<bugzilla href="https://bugzilla.suse.com/933934">SUSE bug 933934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4004" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4004" ref_url="https://www.suse.com/security/cve/CVE-2015-4004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4004/">CVE-2015-4004</cve>
	<bugzilla href="https://bugzilla.suse.com/933934">SUSE bug 933934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4035" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4035" ref_url="https://www.suse.com/security/cve/CVE-2015-4035" source="SUSE CVE"/>
    <description>
    scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4035/">CVE-2015-4035</cve>
	<bugzilla href="https://bugzilla.suse.com/931678">SUSE bug 931678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338883" comment="xz is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4036" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4036" ref_url="https://www.suse.com/security/cve/CVE-2015-4036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call.  NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4036/">CVE-2015-4036</cve>
	<bugzilla href="https://bugzilla.suse.com/931988">SUSE bug 931988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514972" comment="qemu-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514973" comment="qemu-block-curl-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514974" comment="qemu-ipxe-1.0.0-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514975" comment="qemu-kvm-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514976" comment="qemu-seabios-1.7.4-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514977" comment="qemu-sgabios-8-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514978" comment="qemu-tools-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514979" comment="qemu-vgabios-1.7.4-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514980" comment="qemu-x86-2.0.2-48.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515134" comment="xen-4.4.3_02-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515135" comment="xen-kmp-default-4.4.3_02_k3.12.48_52.27-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515136" comment="xen-libs-4.4.3_02-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515137" comment="xen-libs-32bit-4.4.3_02-22.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1059-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00030.html" source="SUSE-SU"/>
    <description>
    The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114699" comment="coreutils-8.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114700" comment="coreutils-lang-8.22-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512066" comment="coreutils-8.25-13.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512067" comment="coreutils-lang-8.25-13.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515028" comment="coreutils-8.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515029" comment="coreutils-lang-8.22-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1059-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114699" comment="coreutils-8.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114700" comment="coreutils-lang-8.22-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512066" comment="coreutils-8.25-13.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512067" comment="coreutils-lang-8.25-13.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515028" comment="coreutils-8.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515029" comment="coreutils-lang-8.22-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514757" comment="xen-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514758" comment="xen-kmp-default-4.4.2_06_k3.12.39_47-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514759" comment="xen-libs-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514760" comment="xen-libs-32bit-4.4.2_06-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514757" comment="xen-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514758" comment="xen-kmp-default-4.4.2_06_k3.12.39_47-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514759" comment="xen-libs-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514760" comment="xen-libs-32bit-4.4.2_06-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514757" comment="xen-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514758" comment="xen-kmp-default-4.4.2_06_k3.12.39_47-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514759" comment="xen-libs-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514760" comment="xen-libs-32bit-4.4.2_06-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514757" comment="xen-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514758" comment="xen-kmp-default-4.4.2_06_k3.12.39_47-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514759" comment="xen-libs-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514760" comment="xen-libs-32bit-4.4.2_06-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516416" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516416" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516416" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514757" comment="xen-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514758" comment="xen-kmp-default-4.4.2_06_k3.12.39_47-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514759" comment="xen-libs-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514760" comment="xen-libs-32bit-4.4.2_06-21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514757" comment="xen-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514758" comment="xen-kmp-default-4.4.2_06_k3.12.39_47-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514759" comment="xen-libs-4.4.2_06-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514760" comment="xen-libs-32bit-4.4.2_06-21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001641.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1082-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00040.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514796" comment="strongswan-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514797" comment="strongswan-doc-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514798" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514799" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4176" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4176" ref_url="https://www.suse.com/security/cve/CVE-2015-4176" source="SUSE CVE"/>
    <description>
    fs/namespace.c in the Linux kernel before 4.0.2 does not properly support mount connectivity, which allows local users to read arbitrary files by leveraging user-namespace root access for deletion of a file or directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4176/">CVE-2015-4176</cve>
	<bugzilla href="https://bugzilla.suse.com/933971">SUSE bug 933971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4177" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4177" ref_url="https://www.suse.com/security/cve/CVE-2015-4177" source="SUSE CVE"/>
    <description>
    The collect_mounts function in fs/namespace.c in the Linux kernel before 4.0.5 does not properly consider that it may execute after a path has been unmounted, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4177/">CVE-2015-4177</cve>
	<bugzilla href="https://bugzilla.suse.com/933969">SUSE bug 933969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933970">SUSE bug 933970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4178" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4178" ref_url="https://www.suse.com/security/cve/CVE-2015-4178" source="SUSE CVE"/>
    <description>
    The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/linux/fs_pin.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4178/">CVE-2015-4178</cve>
	<bugzilla href="https://bugzilla.suse.com/933969">SUSE bug 933969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933970">SUSE bug 933970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933971">SUSE bug 933971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4428" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4428" ref_url="https://www.suse.com/security/cve/CVE-2015-4428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4428/">CVE-2015-4428</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4429" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4429" ref_url="https://www.suse.com/security/cve/CVE-2015-4429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-3126.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4429/">CVE-2015-4429</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4430" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4430" ref_url="https://www.suse.com/security/cve/CVE-2015-4430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4430/">CVE-2015-4430</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4431" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4431" ref_url="https://www.suse.com/security/cve/CVE-2015-4431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, and CVE-2015-3134.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4431/">CVE-2015-4431</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4432" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4432" ref_url="https://www.suse.com/security/cve/CVE-2015-4432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-5118.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4432/">CVE-2015-4432</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4433" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4433" ref_url="https://www.suse.com/security/cve/CVE-2015-4433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, and CVE-2015-3122.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4433/">CVE-2015-4433</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4467" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The chmd_init_decomp function in chmd.c in libmspack before 0.5 does not properly validate the reset interval, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4468" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the search_chunk function in chmd.c in libmspack before 0.5 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4469" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The chmd_read_headers function in chmd.c in libmspack before 0.5 does not validate name lengths, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4470" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the inflate function in mszipd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4471" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the lzxd_decompress function in lzxd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer under-read and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the READ_ENCINT macro in chmd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4474" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-23"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1500-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515368" comment="gdk-pixbuf-lang-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515369" comment="gdk-pixbuf-query-loaders-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515370" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515371" comment="libgdk_pixbuf-2_0-0-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515372" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515373" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519845" comment="gdk-pixbuf-lang-2.34.0-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519846" comment="gdk-pixbuf-query-loaders-2.34.0-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519847" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519848" comment="libgdk_pixbuf-2_0-0-2.34.0-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519849" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519850" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.14.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515368" comment="gdk-pixbuf-lang-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515369" comment="gdk-pixbuf-query-loaders-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515370" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515371" comment="libgdk_pixbuf-2_0-0-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515372" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515373" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
    <description>
    The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<bugzilla href="https://bugzilla.suse.com/943550">SUSE bug 943550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943557">SUSE bug 943557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html" source="SUSE-SU"/>
    <description>
    The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<bugzilla href="https://bugzilla.suse.com/943550">SUSE bug 943550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943558">SUSE bug 943558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 uses the stored LinkUpdateMode configuration information in OpenDocument Format files and templates when handling links, which might allow remote attackers to obtain sensitive information via a crafted document, which embeds data from local files into (1) Calc or (2) Writer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<bugzilla href="https://bugzilla.suse.com/893141">SUSE bug 893141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936188">SUSE bug 936188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936190">SUSE bug 936190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940838">SUSE bug 940838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515138" comment="apache-commons-logging-1.1.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515139" comment="flute-1.3.0-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515140" comment="libabw-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515141" comment="libbase-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515142" comment="libcdr-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515143" comment="libcmis-0_5-5-0.5.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515144" comment="libe-book-0_1-1-0.1.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515145" comment="libetonyek-0_1-1-0.1.3-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515146" comment="libfonts-1.1.3-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515147" comment="libformula-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515148" comment="libfreehand-0_1-1-0.1.1-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515149" comment="libgltf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515150" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515151" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515152" comment="libhyphen0-2.8.8-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515153" comment="libixion-0_10-0-0.9.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515154" comment="liblangtag1-0.5.7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515155" comment="liblayout-0.2.10-4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515156" comment="libloader-1.1.3-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515157" comment="libmspub-0_1-1-0.1.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515158" comment="libmwaw-0_3-3-0.3.6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515159" comment="libodfgen-0_1-1-0.1.4-3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515160" comment="liborcus-0_8-0-0.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515161" comment="libpagemaker-0_0-0-0.0.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515162" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515163" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515164" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515165" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515166" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515167" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515168" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515169" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515170" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515171" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515172" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515173" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515174" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515175" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515176" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515177" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515178" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515179" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515180" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515181" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515182" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515183" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515184" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515185" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515186" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515187" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515188" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515189" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515190" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515191" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515192" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515193" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515194" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515195" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515196" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515197" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515198" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515199" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515200" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515201" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515202" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515203" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515204" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515205" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515207" comment="libreoffice-voikko-4.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515208" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515209" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515210" comment="librepository-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515211" comment="librevenge-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515212" comment="librevenge-stream-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515213" comment="libserializer-1.1.2-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515214" comment="libvisio-0_1-1-0.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515215" comment="libvoikko1-3.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515216" comment="libwps-0_4-4-0.4.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515217" comment="malaga-suomi-1.18-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515218" comment="myspell-af_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515219" comment="myspell-ar-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515220" comment="myspell-be_BY-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515221" comment="myspell-bg_BG-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515222" comment="myspell-bn_BD-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515223" comment="myspell-bs_BA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515224" comment="myspell-ca-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515225" comment="myspell-cs_CZ-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515226" comment="myspell-da_DK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515227" comment="myspell-de-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515228" comment="myspell-dictionaries-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515229" comment="myspell-el_GR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515230" comment="myspell-en-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515231" comment="myspell-es-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515232" comment="myspell-et_EE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515233" comment="myspell-fr_FR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515234" comment="myspell-gu_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515235" comment="myspell-he_IL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515236" comment="myspell-hi_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515237" comment="myspell-hr_HR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515238" comment="myspell-hu_HU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515239" comment="myspell-it_IT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515240" comment="myspell-lo_LA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515241" comment="myspell-lt_LT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515242" comment="myspell-lv_LV-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515243" comment="myspell-nl_NL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515244" comment="myspell-no-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515245" comment="myspell-pl_PL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515246" comment="myspell-pt_BR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515247" comment="myspell-pt_PT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515248" comment="myspell-ro-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515249" comment="myspell-ru_RU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515250" comment="myspell-sk_SK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515251" comment="myspell-sl_SI-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515252" comment="myspell-sr-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515253" comment="myspell-sv_SE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515254" comment="myspell-te_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515255" comment="myspell-th_TH-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515256" comment="myspell-vi-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515257" comment="myspell-zu_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515258" comment="pentaho-libxml-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515259" comment="pentaho-reporting-flow-engine-0.9.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515260" comment="sac-1.3-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1134-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114120" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514965" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
    <description>
    name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<bugzilla href="https://bugzilla.suse.com/936476">SUSE bug 936476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514801" comment="bind-libs-9.9.6P1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514802" comment="bind-libs-32bit-9.9.6P1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514803" comment="bind-utils-9.9.6P1-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<bugzilla href="https://bugzilla.suse.com/935119">SUSE bug 935119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115371" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115372" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115373" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115376" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515105" comment="libpolkit0-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515106" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515107" comment="polkit-0.113-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515108" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4692" ref_url="https://www.suse.com/security/cve/CVE-2015-4692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4692/">CVE-2015-4692</cve>
	<bugzilla href="https://bugzilla.suse.com/935542">SUSE bug 935542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114120" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514965" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114120" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514965" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4729" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4736" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4807" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4810" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969667">SUSE bug 969667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4868" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and Java SE Embedded 8u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4901" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4902" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4906" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors related to JavaFX, a different vulnerability than CVE-2015-4908 and CVE-2015-4916.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4908" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4916.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4916" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4908.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5116" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5116" ref_url="https://www.suse.com/security/cve/CVE-2015-5116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-3125.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5116/">CVE-2015-5116</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5117" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5117" ref_url="https://www.suse.com/security/cve/CVE-2015-5117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, and CVE-2015-4430.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5117/">CVE-2015-5117</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5118" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5118" ref_url="https://www.suse.com/security/cve/CVE-2015-5118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-4432.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5118/">CVE-2015-5118</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5119" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5119" ref_url="https://www.suse.com/security/cve/CVE-2015-5119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5119/">CVE-2015-5119</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5122" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5122" ref_url="https://www.suse.com/security/cve/CVE-2015-5122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5122/">CVE-2015-5122</cve>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514807" comment="flash-player-11.2.202.491-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514808" comment="flash-player-gnome-11.2.202.491-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5123" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5123" ref_url="https://www.suse.com/security/cve/CVE-2015-5123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5123/">CVE-2015-5123</cve>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514807" comment="flash-player-11.2.202.491-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514808" comment="flash-player-gnome-11.2.202.491-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5124" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5124" ref_url="https://www.suse.com/security/cve/CVE-2015-5124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5124/">CVE-2015-5124</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5125" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5125" ref_url="https://www.suse.com/security/cve/CVE-2015-5125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to cause a denial of service (vector-length corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5125/">CVE-2015-5125</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5127" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5127" ref_url="https://www.suse.com/security/cve/CVE-2015-5127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5127/">CVE-2015-5127</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5128" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5128" ref_url="https://www.suse.com/security/cve/CVE-2015-5128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5128/">CVE-2015-5128</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5129" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5129" ref_url="https://www.suse.com/security/cve/CVE-2015-5129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5541.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5129/">CVE-2015-5129</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5130" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952254">SUSE bug 952254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5131" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5131" ref_url="https://www.suse.com/security/cve/CVE-2015-5131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5132 and CVE-2015-5133.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5131/">CVE-2015-5131</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5132" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5132" ref_url="https://www.suse.com/security/cve/CVE-2015-5132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5131 and CVE-2015-5133.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5132/">CVE-2015-5132</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5133" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5133" ref_url="https://www.suse.com/security/cve/CVE-2015-5133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5131 and CVE-2015-5132.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5133/">CVE-2015-5133</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5134" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5134" ref_url="https://www.suse.com/security/cve/CVE-2015-5134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5134/">CVE-2015-5134</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515074" comment="qemu-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515075" comment="qemu-block-curl-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515076" comment="qemu-ipxe-1.0.0-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515077" comment="qemu-kvm-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515078" comment="qemu-seabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515079" comment="qemu-sgabios-8-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515080" comment="qemu-tools-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515081" comment="qemu-vgabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515082" comment="qemu-x86-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514838" comment="xen-4.4.2_08-22.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514839" comment="xen-kmp-default-4.4.2_08_k3.12.43_52.6-22.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514840" comment="xen-libs-4.4.2_08-22.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514841" comment="xen-libs-32bit-4.4.2_08-22.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5156" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945048">SUSE bug 945048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515038" comment="kernel-default-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515039" comment="kernel-default-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515040" comment="kernel-default-extra-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515041" comment="kernel-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515042" comment="kernel-macros-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515043" comment="kernel-source-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515044" comment="kernel-syms-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515045" comment="kernel-xen-3.12.48-52.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515046" comment="kernel-xen-devel-3.12.48-52.27.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516145" comment="kernel-default-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516146" comment="kernel-default-devel-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516147" comment="kernel-default-extra-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516148" comment="kernel-devel-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516149" comment="kernel-macros-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516150" comment="kernel-source-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516151" comment="kernel-syms-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516152" comment="kernel-xen-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516153" comment="kernel-xen-devel-3.12.51-60.20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515038" comment="kernel-default-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515039" comment="kernel-default-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515040" comment="kernel-default-extra-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515041" comment="kernel-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515042" comment="kernel-macros-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515043" comment="kernel-source-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515044" comment="kernel-syms-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515045" comment="kernel-xen-3.12.48-52.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515046" comment="kernel-xen-devel-3.12.48-52.27.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5158" ref_url="https://www.suse.com/security/cve/CVE-2015-5158" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5158/">CVE-2015-5158</cve>
	<bugzilla href="https://bugzilla.suse.com/939254">SUSE bug 939254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514913" comment="xen-4.4.2_10-22.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514914" comment="xen-kmp-default-4.4.2_10_k3.12.44_52.10-22.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514915" comment="xen-libs-4.4.2_10-22.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514916" comment="xen-libs-32bit-4.4.2_10-22.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5166" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514913" comment="xen-4.4.2_10-22.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514914" comment="xen-kmp-default-4.4.2_10_k3.12.44_52.10-22.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514915" comment="xen-libs-4.4.2_10-22.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514916" comment="xen-libs-32bit-4.4.2_10-22.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005635.html" source="SUSE-SU"/>
    <description>
    res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521925" comment="glibc-2.22-100.15.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521926" comment="glibc-32bit-2.22-100.15.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521927" comment="glibc-devel-2.22-100.15.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521928" comment="glibc-devel-32bit-2.22-100.15.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521929" comment="glibc-i18ndata-2.22-100.15.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521930" comment="glibc-locale-2.22-100.15.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521931" comment="glibc-locale-32bit-2.22-100.15.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521932" comment="nscd-2.22-100.15.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5185" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1571-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    The lookupProviders function in providerMgr.c in sblim-sfcb 1.3.4 and 1.3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty className in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141124" comment="sblim-sfcb-1.4.8-8.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159305" comment="sblim-sfcb-1.4.8-16.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512618" comment="sblim-sfcb-1.4.8-17.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515303" comment="sblim-sfcb-1.4.8-5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0563-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190563-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005428.html" source="SUSE-SU"/>
    <description>
    Audit before 2.4.4 in Linux does not sanitize escape characters in filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186</cve>
	<bugzilla href="https://bugzilla.suse.com/941922">SUSE bug 941922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333990" comment="audit is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521142" comment="audit-2.8.1-8.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521143" comment="libaudit1-2.8.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521144" comment="libaudit1-32bit-2.8.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521145" comment="libauparse0-2.8.1-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522481" comment="audit-2.8.1-10.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522482" comment="libaudit1-2.8.1-10.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522483" comment="libaudit1-32bit-2.8.1-10.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522484" comment="libauparse0-2.8.1-10.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0827-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00092.html" source="SUSE-SU"/>
    <description>
    VMware Tools prior to 10.0.9 contains multiple file system races in libDeployPkg, related to the use of hard-coded paths under /tmp. Successful exploitation of this issue may result in a local privilege escalation. CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<bugzilla href="https://bugzilla.suse.com/1007600">SUSE bug 1007600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159247" comment="libvmtools0-10.1.5-2.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159248" comment="open-vm-tools-10.1.5-2.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159249" comment="open-vm-tools-desktop-10.1.5-2.17 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512527" comment="libvmtools0-10.3.0-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512528" comment="open-vm-tools-10.3.0-2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512529" comment="open-vm-tools-desktop-10.3.0-2.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517168" comment="libvmtools0-10.1.0-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517169" comment="open-vm-tools-10.1.0-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517170" comment="open-vm-tools-desktop-10.1.0-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518489" comment="libvmtools0-10.1.0-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518490" comment="open-vm-tools-10.1.0-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518491" comment="open-vm-tools-desktop-10.1.0-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5198" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to gain privileges via unspecified vectors, related to the VDPAU_DRIVER_PATH environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<bugzilla href="https://bugzilla.suse.com/943967">SUSE bug 943967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115565" comment="libvdpau1-0.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115566" comment="libvdpau1-32bit-0.8-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142145" comment="libvdpau1-32bit-1.1.1-6.73 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515129" comment="libvdpau1-0.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515130" comment="libvdpau1-32bit-0.8-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5199" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in dlopen in libvdpau before 1.1.1 allows local users to gain privileges via the VDPAU_DRIVER environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<bugzilla href="https://bugzilla.suse.com/943968">SUSE bug 943968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115565" comment="libvdpau1-0.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115566" comment="libvdpau1-32bit-0.8-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142145" comment="libvdpau1-32bit-1.1.1-6.73 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515129" comment="libvdpau1-0.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515130" comment="libvdpau1-32bit-0.8-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5200" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<bugzilla href="https://bugzilla.suse.com/943969">SUSE bug 943969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115565" comment="libvdpau1-0.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115566" comment="libvdpau1-32bit-0.8-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142145" comment="libvdpau1-32bit-1.1.1-6.73 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515129" comment="libvdpau1-0.8-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515130" comment="libvdpau1-32bit-0.8-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5203" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    Integer underflow in LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2, when the configuration setting "Load printer settings with the document" is enabled, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via crafted PrinterSetup data in an ODF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936188">SUSE bug 936188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515138" comment="apache-commons-logging-1.1.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515139" comment="flute-1.3.0-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515140" comment="libabw-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515141" comment="libbase-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515142" comment="libcdr-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515143" comment="libcmis-0_5-5-0.5.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515144" comment="libe-book-0_1-1-0.1.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515145" comment="libetonyek-0_1-1-0.1.3-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515146" comment="libfonts-1.1.3-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515147" comment="libformula-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515148" comment="libfreehand-0_1-1-0.1.1-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515149" comment="libgltf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515150" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515151" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515152" comment="libhyphen0-2.8.8-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515153" comment="libixion-0_10-0-0.9.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515154" comment="liblangtag1-0.5.7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515155" comment="liblayout-0.2.10-4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515156" comment="libloader-1.1.3-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515157" comment="libmspub-0_1-1-0.1.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515158" comment="libmwaw-0_3-3-0.3.6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515159" comment="libodfgen-0_1-1-0.1.4-3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515160" comment="liborcus-0_8-0-0.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515161" comment="libpagemaker-0_0-0-0.0.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515162" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515163" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515164" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515165" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515166" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515167" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515168" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515169" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515170" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515171" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515172" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515173" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515174" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515175" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515176" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515177" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515178" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515179" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515180" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515181" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515182" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515183" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515184" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515185" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515186" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515187" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515188" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515189" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515190" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515191" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515192" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515193" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515194" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515195" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515196" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515197" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515198" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515199" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515200" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515201" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515202" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515203" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515204" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515205" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515207" comment="libreoffice-voikko-4.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515208" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515209" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515210" comment="librepository-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515211" comment="librevenge-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515212" comment="librevenge-stream-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515213" comment="libserializer-1.1.2-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515214" comment="libvisio-0_1-1-0.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515215" comment="libvoikko1-3.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515216" comment="libwps-0_4-4-0.4.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515217" comment="malaga-suomi-1.18-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515218" comment="myspell-af_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515219" comment="myspell-ar-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515220" comment="myspell-be_BY-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515221" comment="myspell-bg_BG-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515222" comment="myspell-bn_BD-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515223" comment="myspell-bs_BA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515224" comment="myspell-ca-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515225" comment="myspell-cs_CZ-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515226" comment="myspell-da_DK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515227" comment="myspell-de-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515228" comment="myspell-dictionaries-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515229" comment="myspell-el_GR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515230" comment="myspell-en-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515231" comment="myspell-es-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515232" comment="myspell-et_EE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515233" comment="myspell-fr_FR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515234" comment="myspell-gu_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515235" comment="myspell-he_IL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515236" comment="myspell-hi_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515237" comment="myspell-hr_HR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515238" comment="myspell-hu_HU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515239" comment="myspell-it_IT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515240" comment="myspell-lo_LA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515241" comment="myspell-lt_LT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515242" comment="myspell-lv_LV-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515243" comment="myspell-nl_NL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515244" comment="myspell-no-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515245" comment="myspell-pl_PL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515246" comment="myspell-pt_BR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515247" comment="myspell-pt_PT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515248" comment="myspell-ro-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515249" comment="myspell-ru_RU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515250" comment="myspell-sk_SK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515251" comment="myspell-sl_SI-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515252" comment="myspell-sr-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515253" comment="myspell-sv_SE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515254" comment="myspell-te_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515255" comment="myspell-th_TH-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515256" comment="myspell-vi-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515257" comment="myspell-zu_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515258" comment="pentaho-libxml-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515259" comment="pentaho-reporting-flow-engine-0.9.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515260" comment="sac-1.3-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    Integer overflow in LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a long DOC file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936190">SUSE bug 936190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515138" comment="apache-commons-logging-1.1.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515139" comment="flute-1.3.0-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515140" comment="libabw-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515141" comment="libbase-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515142" comment="libcdr-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515143" comment="libcmis-0_5-5-0.5.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515144" comment="libe-book-0_1-1-0.1.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515145" comment="libetonyek-0_1-1-0.1.3-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515146" comment="libfonts-1.1.3-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515147" comment="libformula-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515148" comment="libfreehand-0_1-1-0.1.1-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515149" comment="libgltf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515150" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515151" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515152" comment="libhyphen0-2.8.8-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515153" comment="libixion-0_10-0-0.9.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515154" comment="liblangtag1-0.5.7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515155" comment="liblayout-0.2.10-4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515156" comment="libloader-1.1.3-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515157" comment="libmspub-0_1-1-0.1.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515158" comment="libmwaw-0_3-3-0.3.6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515159" comment="libodfgen-0_1-1-0.1.4-3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515160" comment="liborcus-0_8-0-0.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515161" comment="libpagemaker-0_0-0-0.0.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515162" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515163" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515164" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515165" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515166" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515167" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515168" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515169" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515170" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515171" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515172" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515173" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515174" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515175" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515176" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515177" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515178" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515179" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515180" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515181" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515182" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515183" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515184" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515185" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515186" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515187" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515188" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515189" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515190" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515191" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515192" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515193" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515194" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515195" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515196" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515197" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515198" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515199" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515200" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515201" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515202" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515203" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515204" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515205" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515207" comment="libreoffice-voikko-4.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515208" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515209" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515210" comment="librepository-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515211" comment="librevenge-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515212" comment="librevenge-stream-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515213" comment="libserializer-1.1.2-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515214" comment="libvisio-0_1-1-0.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515215" comment="libvoikko1-3.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515216" comment="libwps-0_4-4-0.4.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515217" comment="malaga-suomi-1.18-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515218" comment="myspell-af_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515219" comment="myspell-ar-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515220" comment="myspell-be_BY-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515221" comment="myspell-bg_BG-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515222" comment="myspell-bn_BD-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515223" comment="myspell-bs_BA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515224" comment="myspell-ca-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515225" comment="myspell-cs_CZ-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515226" comment="myspell-da_DK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515227" comment="myspell-de-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515228" comment="myspell-dictionaries-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515229" comment="myspell-el_GR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515230" comment="myspell-en-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515231" comment="myspell-es-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515232" comment="myspell-et_EE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515233" comment="myspell-fr_FR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515234" comment="myspell-gu_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515235" comment="myspell-he_IL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515236" comment="myspell-hi_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515237" comment="myspell-hr_HR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515238" comment="myspell-hu_HU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515239" comment="myspell-it_IT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515240" comment="myspell-lo_LA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515241" comment="myspell-lt_LT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515242" comment="myspell-lv_LV-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515243" comment="myspell-nl_NL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515244" comment="myspell-no-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515245" comment="myspell-pl_PL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515246" comment="myspell-pt_BR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515247" comment="myspell-pt_PT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515248" comment="myspell-ro-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515249" comment="myspell-ru_RU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515250" comment="myspell-sk_SK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515251" comment="myspell-sl_SI-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515252" comment="myspell-sr-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515253" comment="myspell-sv_SE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515254" comment="myspell-te_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515255" comment="myspell-th_TH-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515256" comment="myspell-vi-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515257" comment="myspell-zu_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515258" comment="pentaho-libxml-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515259" comment="pentaho-reporting-flow-engine-0.9.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515260" comment="sac-1.3-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 4.4.6 and 5.x before 5.0.1 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via an index to a non-existent bookmark in a DOC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940838">SUSE bug 940838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515138" comment="apache-commons-logging-1.1.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515139" comment="flute-1.3.0-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515140" comment="libabw-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515141" comment="libbase-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515142" comment="libcdr-0_1-1-0.1.1-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515143" comment="libcmis-0_5-5-0.5.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515144" comment="libe-book-0_1-1-0.1.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515145" comment="libetonyek-0_1-1-0.1.3-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515146" comment="libfonts-1.1.3-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515147" comment="libformula-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515148" comment="libfreehand-0_1-1-0.1.1-4.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515149" comment="libgltf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515150" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515151" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515152" comment="libhyphen0-2.8.8-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515153" comment="libixion-0_10-0-0.9.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515154" comment="liblangtag1-0.5.7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515155" comment="liblayout-0.2.10-4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515156" comment="libloader-1.1.3-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515157" comment="libmspub-0_1-1-0.1.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515158" comment="libmwaw-0_3-3-0.3.6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515159" comment="libodfgen-0_1-1-0.1.4-3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515160" comment="liborcus-0_8-0-0.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515161" comment="libpagemaker-0_0-0-0.0.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515162" comment="libreoffice-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515163" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515164" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515165" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515166" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515167" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515168" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515169" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515170" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515171" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515172" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515173" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515174" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515175" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515176" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515177" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515178" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515179" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515180" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515181" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515182" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515183" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515184" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515185" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515186" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515187" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515188" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515189" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515190" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515191" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515192" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515193" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515194" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515195" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515196" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515197" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515198" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515199" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515200" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515201" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515202" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515203" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515204" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515205" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515207" comment="libreoffice-voikko-4.1-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515208" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515209" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515210" comment="librepository-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515211" comment="librevenge-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515212" comment="librevenge-stream-0_0-0-0.0.2-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515213" comment="libserializer-1.1.2-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515214" comment="libvisio-0_1-1-0.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515215" comment="libvoikko1-3.7.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515216" comment="libwps-0_4-4-0.4.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515217" comment="malaga-suomi-1.18-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515218" comment="myspell-af_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515219" comment="myspell-ar-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515220" comment="myspell-be_BY-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515221" comment="myspell-bg_BG-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515222" comment="myspell-bn_BD-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515223" comment="myspell-bs_BA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515224" comment="myspell-ca-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515225" comment="myspell-cs_CZ-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515226" comment="myspell-da_DK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515227" comment="myspell-de-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515228" comment="myspell-dictionaries-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515229" comment="myspell-el_GR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515230" comment="myspell-en-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515231" comment="myspell-es-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515232" comment="myspell-et_EE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515233" comment="myspell-fr_FR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515234" comment="myspell-gu_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515235" comment="myspell-he_IL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515236" comment="myspell-hi_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515237" comment="myspell-hr_HR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515238" comment="myspell-hu_HU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515239" comment="myspell-it_IT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515240" comment="myspell-lo_LA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515241" comment="myspell-lt_LT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515242" comment="myspell-lv_LV-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515243" comment="myspell-nl_NL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515244" comment="myspell-no-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515245" comment="myspell-pl_PL-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515246" comment="myspell-pt_BR-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515247" comment="myspell-pt_PT-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515248" comment="myspell-ro-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515249" comment="myspell-ru_RU-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515250" comment="myspell-sk_SK-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515251" comment="myspell-sl_SI-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515252" comment="myspell-sr-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515253" comment="myspell-sv_SE-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515254" comment="myspell-te_IN-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515255" comment="myspell-th_TH-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515256" comment="myspell-vi-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515257" comment="myspell-zu_ZA-20150827-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515258" comment="pentaho-libxml-1.1.3-4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515259" comment="pentaho-reporting-flow-engine-0.9.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515260" comment="sac-1.3-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008640.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1910-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<bugzilla href="https://bugzilla.suse.com/949754">SUSE bug 949754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140779" comment="libblkid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140780" comment="libblkid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140781" comment="libfdisk1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140782" comment="libmount1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140783" comment="libmount1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140784" comment="libsmartcols1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142130" comment="libuuid-devel-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140785" comment="libuuid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140786" comment="libuuid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140787" comment="python-libmount-2.28-40.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140788" comment="util-linux-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140789" comment="util-linux-lang-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140790" comment="util-linux-systemd-2.28-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140791" comment="uuidd-2.28-40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159070" comment="libblkid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159071" comment="libblkid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159072" comment="libfdisk1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159073" comment="libmount1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159074" comment="libmount1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159075" comment="libsmartcols1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159649" comment="libuuid-devel-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159076" comment="libuuid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159077" comment="libuuid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159078" comment="python-libmount-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159079" comment="util-linux-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159080" comment="util-linux-lang-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159081" comment="util-linux-systemd-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159082" comment="uuidd-2.29.2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512244" comment="libblkid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512245" comment="libblkid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512246" comment="libfdisk1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512247" comment="libmount1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512248" comment="libmount1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512249" comment="libsmartcols1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512250" comment="libuuid-devel-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512251" comment="libuuid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512252" comment="libuuid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512253" comment="python-libmount-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512254" comment="util-linux-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512255" comment="util-linux-lang-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512256" comment="util-linux-systemd-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512257" comment="uuidd-2.29.2-7.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561634" comment="bash-completion-2.1-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141904" comment="libblkid1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141905" comment="libblkid1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141906" comment="libmount1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141907" comment="libmount1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141908" comment="libsmartcols1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141909" comment="libuuid-devel-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141910" comment="libuuid1-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141911" comment="libuuid1-32bit-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141912" comment="python-libmount-2.25-30.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141913" comment="util-linux-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141914" comment="util-linux-lang-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141915" comment="util-linux-systemd-2.25-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141916" comment="uuidd-2.25-30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561634" comment="bash-completion-2.1-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561635" comment="libblkid1-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561636" comment="libblkid1-32bit-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561637" comment="libmount1-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561638" comment="libmount1-32bit-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561639" comment="libsmartcols1-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561640" comment="libuuid-devel-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561641" comment="libuuid1-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561642" comment="libuuid1-32bit-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561643" comment="python-libmount-2.25-24.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561644" comment="util-linux-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561645" comment="util-linux-lang-2.25-24.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561646" comment="util-linux-systemd-2.25-24.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561647" comment="uuidd-2.25-24.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5221" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5224" ref_url="https://www.suse.com/security/cve/CVE-2015-5224" source="SUSE CVE"/>
    <description>
    The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5224/">CVE-2015-5224</cve>
	<bugzilla href="https://bugzilla.suse.com/943012">SUSE bug 943012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334326" comment="util-linux is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225" source="SUSE CVE"/>
    <description>
    Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<bugzilla href="https://bugzilla.suse.com/942845">SUSE bug 942845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<bugzilla href="https://bugzilla.suse.com/944209">SUSE bug 944209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515034" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<bugzilla href="https://bugzilla.suse.com/944208">SUSE bug 944208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515034" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515134" comment="xen-4.4.3_02-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515135" comment="xen-kmp-default-4.4.3_02_k3.12.48_52.27-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515136" comment="xen-libs-4.4.3_02-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515137" comment="xen-libs-32bit-4.4.3_02-22.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247" source="SUSE CVE"/>
    <description>
    The virStorageVolCreateXML API in libvirt 1.2.14 through 1.2.19 allows remote authenticated users with a read-write connection to cause a denial of service (libvirtd crash) by triggering a failed unlink after creating a volume on a root_squash NFS pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<bugzilla href="https://bugzilla.suse.com/945645">SUSE bug 945645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515385" comment="libdcerpc-binding0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515386" comment="libdcerpc-binding0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515387" comment="libdcerpc0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515388" comment="libdcerpc0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515389" comment="libgensec0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515390" comment="libgensec0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515391" comment="libldb1-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515392" comment="libldb1-32bit-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515393" comment="libndr-krb5pac0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515394" comment="libndr-krb5pac0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515395" comment="libndr-nbt0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515396" comment="libndr-nbt0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515397" comment="libndr-standard0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515398" comment="libndr-standard0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515399" comment="libndr0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515400" comment="libndr0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515401" comment="libnetapi0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515402" comment="libnetapi0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515403" comment="libpdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515404" comment="libpdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515405" comment="libregistry0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515406" comment="libsamba-credentials0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515407" comment="libsamba-credentials0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515408" comment="libsamba-hostconfig0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515409" comment="libsamba-hostconfig0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515410" comment="libsamba-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515411" comment="libsamba-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515412" comment="libsamdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515413" comment="libsamdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515414" comment="libsmbclient-raw0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515415" comment="libsmbclient-raw0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515416" comment="libsmbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515417" comment="libsmbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515418" comment="libsmbconf0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515419" comment="libsmbconf0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515420" comment="libsmbldap0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515421" comment="libsmbldap0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515422" comment="libtalloc2-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515423" comment="libtalloc2-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515424" comment="libtdb1-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515425" comment="libtdb1-32bit-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515426" comment="libtevent-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515427" comment="libtevent-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515428" comment="libtevent0-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515429" comment="libtevent0-32bit-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515430" comment="libwbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515431" comment="libwbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515432" comment="pytalloc-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515433" comment="pytalloc-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515434" comment="samba-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515435" comment="samba-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515436" comment="samba-client-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515437" comment="samba-client-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515438" comment="samba-doc-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515439" comment="samba-libs-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515440" comment="samba-libs-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515441" comment="samba-winbind-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515442" comment="samba-winbind-32bit-4.1.12-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516154" comment="libdcerpc-binding0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516155" comment="libdcerpc-binding0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516156" comment="libdcerpc0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516157" comment="libdcerpc0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516158" comment="libgensec0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516159" comment="libgensec0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516160" comment="libldb1-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516161" comment="libldb1-32bit-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516162" comment="libndr-krb5pac0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516163" comment="libndr-krb5pac0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516164" comment="libndr-nbt0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516165" comment="libndr-nbt0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516166" comment="libndr-standard0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516167" comment="libndr-standard0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516168" comment="libndr0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516169" comment="libndr0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516170" comment="libnetapi0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516171" comment="libnetapi0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516172" comment="libregistry0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516173" comment="libsamba-credentials0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516174" comment="libsamba-credentials0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516175" comment="libsamba-hostconfig0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516176" comment="libsamba-hostconfig0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516177" comment="libsamba-passdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516178" comment="libsamba-passdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516179" comment="libsamba-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516180" comment="libsamba-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516181" comment="libsamdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516182" comment="libsamdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516183" comment="libsmbclient-raw0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516184" comment="libsmbclient-raw0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516185" comment="libsmbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516186" comment="libsmbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516187" comment="libsmbconf0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516188" comment="libsmbconf0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516189" comment="libsmbldap0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516190" comment="libsmbldap0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516191" comment="libtalloc2-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516192" comment="libtalloc2-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516193" comment="libtdb1-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516194" comment="libtdb1-32bit-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516195" comment="libtevent-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516196" comment="libtevent-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516197" comment="libtevent0-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516198" comment="libtevent0-32bit-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516199" comment="libwbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516200" comment="libwbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516201" comment="pytalloc-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516202" comment="pytalloc-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516203" comment="samba-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516204" comment="samba-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516205" comment="samba-client-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516206" comment="samba-client-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516207" comment="samba-doc-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516208" comment="samba-libs-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516209" comment="samba-libs-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516210" comment="samba-winbind-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516211" comment="samba-winbind-32bit-4.2.4-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1750-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<bugzilla href="https://bugzilla.suse.com/944787">SUSE bug 944787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515060" comment="libspice-server1-0.12.4-8.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517022" comment="libspice-server1-0.12.5-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1750-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515060" comment="libspice-server1-0.12.4-8.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517022" comment="libspice-server1-0.12.5-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1946-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1069-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115214" comment="cpp48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115215" comment="gcc48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115258" comment="gcc48-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115217" comment="gcc48-c++-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115239" comment="gcc48-gij-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115238" comment="gcc48-gij-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115219" comment="gcc48-info-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115224" comment="libasan0-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115263" comment="libasan0-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515914" comment="libasan2-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515915" comment="libasan2-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515916" comment="libatomic1-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515917" comment="libatomic1-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515918" comment="libcilkrts5-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515919" comment="libcilkrts5-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515920" comment="libffi4-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515921" comment="libffi4-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515922" comment="libgcc_s1-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515923" comment="libgcc_s1-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115242" comment="libgcj48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115241" comment="libgcj48-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115245" comment="libgcj48-jar-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115246" comment="libgcj_bc1-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515924" comment="libgfortran3-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515925" comment="libgfortran3-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515926" comment="libgomp1-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515927" comment="libgomp1-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515928" comment="libitm1-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515929" comment="libitm1-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515930" comment="liblsan0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515931" comment="libmpx0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515932" comment="libmpx0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515933" comment="libmpxwrappers0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515934" comment="libmpxwrappers0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515935" comment="libquadmath0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515936" comment="libquadmath0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115232" comment="libstdc++48-devel-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115271" comment="libstdc++48-devel-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515937" comment="libstdc++6-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515938" comment="libstdc++6-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515939" comment="libstdc++6-locale-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515940" comment="libtsan0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515941" comment="libubsan0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515942" comment="libubsan0-32bit-5.3.1+r233831-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142081" comment="gcc48-gij-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142082" comment="gcc48-gij-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125716" comment="libasan2-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125717" comment="libasan2-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125723" comment="libffi4-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125724" comment="libffi4-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142083" comment="libgcj48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142084" comment="libgcj48-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142085" comment="libgcj48-jar-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142086" comment="libgcj_bc1-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125734" comment="libmpx0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125735" comment="libmpx0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125736" comment="libmpxwrappers0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125737" comment="libmpxwrappers0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142081" comment="gcc48-gij-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142082" comment="gcc48-gij-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159062" comment="libasan2-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159063" comment="libasan2-32bit-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159064" comment="libffi4-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159065" comment="libffi4-32bit-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142083" comment="libgcj48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142084" comment="libgcj48-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142085" comment="libgcj48-jar-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142086" comment="libgcj_bc1-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159066" comment="libmpx0-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159067" comment="libmpx0-32bit-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159068" comment="libmpxwrappers0-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159069" comment="libmpxwrappers0-32bit-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512070" comment="cpp48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512071" comment="gcc48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512072" comment="gcc48-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512073" comment="gcc48-c++-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512074" comment="gcc48-gij-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512075" comment="gcc48-gij-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512076" comment="gcc48-info-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512077" comment="libasan0-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512078" comment="libasan0-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159062" comment="libasan2-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159063" comment="libasan2-32bit-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159064" comment="libffi4-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159065" comment="libffi4-32bit-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512079" comment="libgcj48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512080" comment="libgcj48-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512081" comment="libgcj48-jar-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512082" comment="libgcj_bc1-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159066" comment="libmpx0-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159067" comment="libmpx0-32bit-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159068" comment="libmpxwrappers0-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159069" comment="libmpxwrappers0-32bit-5.3.1+r233831-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512083" comment="libstdc++48-devel-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512084" comment="libstdc++48-devel-32bit-4.8.5-31.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515090" comment="cpp48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515091" comment="gcc48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515092" comment="gcc48-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515093" comment="gcc48-c++-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515094" comment="gcc48-gij-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515095" comment="gcc48-gij-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515096" comment="gcc48-info-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515097" comment="libasan0-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515098" comment="libasan0-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515914" comment="libasan2-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515915" comment="libasan2-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515916" comment="libatomic1-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515917" comment="libatomic1-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515918" comment="libcilkrts5-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515919" comment="libcilkrts5-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515920" comment="libffi4-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515921" comment="libffi4-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515922" comment="libgcc_s1-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515923" comment="libgcc_s1-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515099" comment="libgcj48-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515100" comment="libgcj48-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515101" comment="libgcj48-jar-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515102" comment="libgcj_bc1-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515924" comment="libgfortran3-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515925" comment="libgfortran3-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515926" comment="libgomp1-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515927" comment="libgomp1-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515928" comment="libitm1-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515929" comment="libitm1-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515930" comment="liblsan0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515931" comment="libmpx0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515932" comment="libmpx0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515933" comment="libmpxwrappers0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515934" comment="libmpxwrappers0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515935" comment="libquadmath0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515936" comment="libquadmath0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515103" comment="libstdc++48-devel-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515104" comment="libstdc++48-devel-32bit-4.8.5-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515937" comment="libstdc++6-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515938" comment="libstdc++6-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515939" comment="libstdc++6-locale-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515940" comment="libtsan0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515941" comment="libubsan0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515942" comment="libubsan0-32bit-5.3.1+r233831-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515074" comment="qemu-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515075" comment="qemu-block-curl-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515076" comment="qemu-ipxe-1.0.0-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515077" comment="qemu-kvm-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515078" comment="qemu-seabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515079" comment="qemu-sgabios-8-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515080" comment="qemu-tools-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515081" comment="qemu-vgabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515082" comment="qemu-x86-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515074" comment="qemu-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515075" comment="qemu-block-curl-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515076" comment="qemu-ipxe-1.0.0-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515077" comment="qemu-kvm-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515078" comment="qemu-seabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515079" comment="qemu-sgabios-8-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515080" comment="qemu-tools-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515081" comment="qemu-vgabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515082" comment="qemu-x86-2.0.2-48.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5283" ref_url="https://www.suse.com/security/cve/CVE-2015-5283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5283/">CVE-2015-5283</cve>
	<bugzilla href="https://bugzilla.suse.com/947155">SUSE bug 947155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1907-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1919-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html" source="SUSE-SU"/>
    <description>
    The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561663" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561664" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561665" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515088" comment="postgresql93-9.3.10-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561666" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1907-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561663" comment="libecpg6-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561664" comment="libpq5-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561665" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515088" comment="postgresql93-9.3.10-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561666" comment="postgresql94-9.4.5-4.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5292" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5292" ref_url="https://www.suse.com/security/cve/CVE-2015-5292" source="SUSE CVE"/>
    <description>
    Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5292/">CVE-2015-5292</cve>
	<bugzilla href="https://bugzilla.suse.com/948819">SUSE bug 948819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333946" comment="sssd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515385" comment="libdcerpc-binding0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515386" comment="libdcerpc-binding0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515387" comment="libdcerpc0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515388" comment="libdcerpc0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515389" comment="libgensec0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515390" comment="libgensec0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515391" comment="libldb1-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515392" comment="libldb1-32bit-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515393" comment="libndr-krb5pac0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515394" comment="libndr-krb5pac0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515395" comment="libndr-nbt0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515396" comment="libndr-nbt0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515397" comment="libndr-standard0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515398" comment="libndr-standard0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515399" comment="libndr0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515400" comment="libndr0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515401" comment="libnetapi0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515402" comment="libnetapi0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515403" comment="libpdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515404" comment="libpdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515405" comment="libregistry0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515406" comment="libsamba-credentials0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515407" comment="libsamba-credentials0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515408" comment="libsamba-hostconfig0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515409" comment="libsamba-hostconfig0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515410" comment="libsamba-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515411" comment="libsamba-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515412" comment="libsamdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515413" comment="libsamdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515414" comment="libsmbclient-raw0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515415" comment="libsmbclient-raw0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515416" comment="libsmbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515417" comment="libsmbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515418" comment="libsmbconf0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515419" comment="libsmbconf0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515420" comment="libsmbldap0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515421" comment="libsmbldap0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515422" comment="libtalloc2-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515423" comment="libtalloc2-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515424" comment="libtdb1-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515425" comment="libtdb1-32bit-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515426" comment="libtevent-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515427" comment="libtevent-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515428" comment="libtevent0-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515429" comment="libtevent0-32bit-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515430" comment="libwbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515431" comment="libwbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515432" comment="pytalloc-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515433" comment="pytalloc-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515434" comment="samba-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515435" comment="samba-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515436" comment="samba-client-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515437" comment="samba-client-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515438" comment="samba-doc-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515439" comment="samba-libs-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515440" comment="samba-libs-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515441" comment="samba-winbind-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515442" comment="samba-winbind-32bit-4.1.12-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516154" comment="libdcerpc-binding0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516155" comment="libdcerpc-binding0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516156" comment="libdcerpc0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516157" comment="libdcerpc0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516158" comment="libgensec0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516159" comment="libgensec0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516160" comment="libldb1-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516161" comment="libldb1-32bit-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516162" comment="libndr-krb5pac0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516163" comment="libndr-krb5pac0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516164" comment="libndr-nbt0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516165" comment="libndr-nbt0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516166" comment="libndr-standard0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516167" comment="libndr-standard0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516168" comment="libndr0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516169" comment="libndr0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516170" comment="libnetapi0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516171" comment="libnetapi0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516172" comment="libregistry0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516173" comment="libsamba-credentials0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516174" comment="libsamba-credentials0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516175" comment="libsamba-hostconfig0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516176" comment="libsamba-hostconfig0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516177" comment="libsamba-passdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516178" comment="libsamba-passdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516179" comment="libsamba-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516180" comment="libsamba-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516181" comment="libsamdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516182" comment="libsamdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516183" comment="libsmbclient-raw0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516184" comment="libsmbclient-raw0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516185" comment="libsmbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516186" comment="libsmbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516187" comment="libsmbconf0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516188" comment="libsmbconf0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516189" comment="libsmbldap0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516190" comment="libsmbldap0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516191" comment="libtalloc2-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516192" comment="libtalloc2-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516193" comment="libtdb1-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516194" comment="libtdb1-32bit-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516195" comment="libtevent-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516196" comment="libtevent-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516197" comment="libtevent0-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516198" comment="libtevent0-32bit-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516199" comment="libwbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516200" comment="libwbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516201" comment="pytalloc-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516202" comment="pytalloc-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516203" comment="samba-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516204" comment="samba-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516205" comment="samba-client-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516206" comment="samba-client-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516207" comment="samba-doc-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516208" comment="samba-libs-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516209" comment="samba-libs-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516210" comment="samba-winbind-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516211" comment="samba-winbind-32bit-4.2.4-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515385" comment="libdcerpc-binding0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515386" comment="libdcerpc-binding0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515387" comment="libdcerpc0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515388" comment="libdcerpc0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515389" comment="libgensec0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515390" comment="libgensec0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515391" comment="libldb1-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515392" comment="libldb1-32bit-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515393" comment="libndr-krb5pac0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515394" comment="libndr-krb5pac0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515395" comment="libndr-nbt0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515396" comment="libndr-nbt0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515397" comment="libndr-standard0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515398" comment="libndr-standard0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515399" comment="libndr0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515400" comment="libndr0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515401" comment="libnetapi0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515402" comment="libnetapi0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515403" comment="libpdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515404" comment="libpdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515405" comment="libregistry0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515406" comment="libsamba-credentials0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515407" comment="libsamba-credentials0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515408" comment="libsamba-hostconfig0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515409" comment="libsamba-hostconfig0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515410" comment="libsamba-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515411" comment="libsamba-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515412" comment="libsamdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515413" comment="libsamdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515414" comment="libsmbclient-raw0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515415" comment="libsmbclient-raw0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515416" comment="libsmbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515417" comment="libsmbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515418" comment="libsmbconf0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515419" comment="libsmbconf0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515420" comment="libsmbldap0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515421" comment="libsmbldap0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515422" comment="libtalloc2-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515423" comment="libtalloc2-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515424" comment="libtdb1-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515425" comment="libtdb1-32bit-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515426" comment="libtevent-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515427" comment="libtevent-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515428" comment="libtevent0-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515429" comment="libtevent0-32bit-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515430" comment="libwbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515431" comment="libwbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515432" comment="pytalloc-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515433" comment="pytalloc-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515434" comment="samba-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515435" comment="samba-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515436" comment="samba-client-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515437" comment="samba-client-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515438" comment="samba-doc-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515439" comment="samba-libs-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515440" comment="samba-libs-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515441" comment="samba-winbind-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515442" comment="samba-winbind-32bit-4.1.12-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516154" comment="libdcerpc-binding0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516155" comment="libdcerpc-binding0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516156" comment="libdcerpc0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516157" comment="libdcerpc0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516158" comment="libgensec0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516159" comment="libgensec0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516160" comment="libldb1-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516161" comment="libldb1-32bit-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516162" comment="libndr-krb5pac0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516163" comment="libndr-krb5pac0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516164" comment="libndr-nbt0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516165" comment="libndr-nbt0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516166" comment="libndr-standard0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516167" comment="libndr-standard0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516168" comment="libndr0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516169" comment="libndr0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516170" comment="libnetapi0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516171" comment="libnetapi0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516172" comment="libregistry0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516173" comment="libsamba-credentials0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516174" comment="libsamba-credentials0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516175" comment="libsamba-hostconfig0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516176" comment="libsamba-hostconfig0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516177" comment="libsamba-passdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516178" comment="libsamba-passdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516179" comment="libsamba-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516180" comment="libsamba-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516181" comment="libsamdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516182" comment="libsamdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516183" comment="libsmbclient-raw0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516184" comment="libsmbclient-raw0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516185" comment="libsmbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516186" comment="libsmbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516187" comment="libsmbconf0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516188" comment="libsmbconf0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516189" comment="libsmbldap0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516190" comment="libsmbldap0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516191" comment="libtalloc2-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516192" comment="libtalloc2-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516193" comment="libtdb1-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516194" comment="libtdb1-32bit-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516195" comment="libtevent-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516196" comment="libtevent-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516197" comment="libtevent0-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516198" comment="libtevent0-32bit-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516199" comment="libwbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516200" comment="libwbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516201" comment="pytalloc-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516202" comment="pytalloc-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516203" comment="samba-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516204" comment="samba-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516205" comment="samba-client-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516206" comment="samba-client-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516207" comment="samba-doc-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516208" comment="samba-libs-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516209" comment="samba-libs-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516210" comment="samba-winbind-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516211" comment="samba-winbind-32bit-4.2.4-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962624">SUSE bug 962624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5310" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
    <description>
    The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<bugzilla href="https://bugzilla.suse.com/952254">SUSE bug 952254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953115">SUSE bug 953115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516416" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0216-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00082.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515735" comment="libvirt-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515736" comment="libvirt-client-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515737" comment="libvirt-client-32bit-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515738" comment="libvirt-daemon-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515739" comment="libvirt-daemon-config-network-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515740" comment="libvirt-daemon-config-nwfilter-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515741" comment="libvirt-daemon-driver-interface-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515742" comment="libvirt-daemon-driver-libxl-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515743" comment="libvirt-daemon-driver-lxc-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515744" comment="libvirt-daemon-driver-network-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515745" comment="libvirt-daemon-driver-nodedev-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515746" comment="libvirt-daemon-driver-nwfilter-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515747" comment="libvirt-daemon-driver-qemu-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515748" comment="libvirt-daemon-driver-secret-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515749" comment="libvirt-daemon-driver-storage-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515750" comment="libvirt-daemon-lxc-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515751" comment="libvirt-daemon-qemu-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515752" comment="libvirt-daemon-xen-1.2.5-27.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515753" comment="libvirt-doc-1.2.5-27.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516922" comment="libvirt-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516923" comment="libvirt-client-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516924" comment="libvirt-client-32bit-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516925" comment="libvirt-daemon-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516926" comment="libvirt-daemon-config-network-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516927" comment="libvirt-daemon-config-nwfilter-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516928" comment="libvirt-daemon-driver-interface-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516929" comment="libvirt-daemon-driver-libxl-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516930" comment="libvirt-daemon-driver-lxc-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516931" comment="libvirt-daemon-driver-network-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516932" comment="libvirt-daemon-driver-nodedev-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516933" comment="libvirt-daemon-driver-nwfilter-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516934" comment="libvirt-daemon-driver-qemu-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516935" comment="libvirt-daemon-driver-secret-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516936" comment="libvirt-daemon-driver-storage-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516937" comment="libvirt-daemon-lxc-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516938" comment="libvirt-daemon-qemu-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516939" comment="libvirt-daemon-xen-1.2.18.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516940" comment="libvirt-doc-1.2.18.2-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140715" comment="libldb1-1.1.26-10.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140716" comment="libldb1-32bit-1.1.26-10.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159154" comment="libldb1-1.1.29-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159155" comment="libldb1-32bit-1.1.29-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512347" comment="libldb1-1.1.29-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512348" comment="libldb1-32bit-1.1.29-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515385" comment="libdcerpc-binding0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515386" comment="libdcerpc-binding0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515387" comment="libdcerpc0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515388" comment="libdcerpc0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515389" comment="libgensec0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515390" comment="libgensec0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515391" comment="libldb1-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515392" comment="libldb1-32bit-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515393" comment="libndr-krb5pac0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515394" comment="libndr-krb5pac0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515395" comment="libndr-nbt0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515396" comment="libndr-nbt0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515397" comment="libndr-standard0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515398" comment="libndr-standard0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515399" comment="libndr0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515400" comment="libndr0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515401" comment="libnetapi0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515402" comment="libnetapi0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515403" comment="libpdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515404" comment="libpdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515405" comment="libregistry0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515406" comment="libsamba-credentials0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515407" comment="libsamba-credentials0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515408" comment="libsamba-hostconfig0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515409" comment="libsamba-hostconfig0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515410" comment="libsamba-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515411" comment="libsamba-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515412" comment="libsamdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515413" comment="libsamdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515414" comment="libsmbclient-raw0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515415" comment="libsmbclient-raw0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515416" comment="libsmbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515417" comment="libsmbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515418" comment="libsmbconf0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515419" comment="libsmbconf0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515420" comment="libsmbldap0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515421" comment="libsmbldap0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515422" comment="libtalloc2-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515423" comment="libtalloc2-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515424" comment="libtdb1-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515425" comment="libtdb1-32bit-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515426" comment="libtevent-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515427" comment="libtevent-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515428" comment="libtevent0-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515429" comment="libtevent0-32bit-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515430" comment="libwbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515431" comment="libwbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515432" comment="pytalloc-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515433" comment="pytalloc-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515434" comment="samba-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515435" comment="samba-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515436" comment="samba-client-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515437" comment="samba-client-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515438" comment="samba-doc-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515439" comment="samba-libs-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515440" comment="samba-libs-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515441" comment="samba-winbind-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515442" comment="samba-winbind-32bit-4.1.12-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516154" comment="libdcerpc-binding0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516155" comment="libdcerpc-binding0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516156" comment="libdcerpc0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516157" comment="libdcerpc0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516158" comment="libgensec0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516159" comment="libgensec0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516160" comment="libldb1-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516161" comment="libldb1-32bit-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516162" comment="libndr-krb5pac0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516163" comment="libndr-krb5pac0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516164" comment="libndr-nbt0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516165" comment="libndr-nbt0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516166" comment="libndr-standard0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516167" comment="libndr-standard0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516168" comment="libndr0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516169" comment="libndr0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516170" comment="libnetapi0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516171" comment="libnetapi0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516172" comment="libregistry0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516173" comment="libsamba-credentials0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516174" comment="libsamba-credentials0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516175" comment="libsamba-hostconfig0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516176" comment="libsamba-hostconfig0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516177" comment="libsamba-passdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516178" comment="libsamba-passdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516179" comment="libsamba-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516180" comment="libsamba-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516181" comment="libsamdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516182" comment="libsamdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516183" comment="libsmbclient-raw0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516184" comment="libsmbclient-raw0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516185" comment="libsmbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516186" comment="libsmbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516187" comment="libsmbconf0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516188" comment="libsmbconf0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516189" comment="libsmbldap0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516190" comment="libsmbldap0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516191" comment="libtalloc2-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516192" comment="libtalloc2-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516193" comment="libtdb1-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516194" comment="libtdb1-32bit-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516195" comment="libtevent-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516196" comment="libtevent-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516197" comment="libtevent0-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516198" comment="libtevent0-32bit-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516199" comment="libwbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516200" comment="libwbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516201" comment="pytalloc-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516202" comment="pytalloc-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516203" comment="samba-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516204" comment="samba-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516205" comment="samba-client-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516206" comment="samba-client-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516207" comment="samba-doc-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516208" comment="samba-libs-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516209" comment="samba-libs-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516210" comment="samba-winbind-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516211" comment="samba-winbind-32bit-4.2.4-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938277">SUSE bug 938277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114322" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114325" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514987" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514988" comment="openssh-askpass-gnome-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514989" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5364" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939276">SUSE bug 939276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945112">SUSE bug 945112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5366" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939276">SUSE bug 939276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945112">SUSE bug 945112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515950" comment="libdcerpc-binding0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515951" comment="libdcerpc-binding0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515952" comment="libdcerpc0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515953" comment="libdcerpc0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515954" comment="libgensec0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515955" comment="libgensec0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515956" comment="libndr-krb5pac0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515957" comment="libndr-krb5pac0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515958" comment="libndr-nbt0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515959" comment="libndr-nbt0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515960" comment="libndr-standard0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515961" comment="libndr-standard0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515962" comment="libndr0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515963" comment="libndr0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515964" comment="libnetapi0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515965" comment="libnetapi0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515966" comment="libregistry0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515967" comment="libsamba-credentials0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515968" comment="libsamba-credentials0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515969" comment="libsamba-hostconfig0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515970" comment="libsamba-hostconfig0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515971" comment="libsamba-passdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515972" comment="libsamba-passdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515973" comment="libsamba-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515974" comment="libsamba-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515975" comment="libsamdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515976" comment="libsamdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515977" comment="libsmbclient-raw0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515978" comment="libsmbclient-raw0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515979" comment="libsmbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515980" comment="libsmbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515981" comment="libsmbconf0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515982" comment="libsmbconf0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515983" comment="libsmbldap0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515984" comment="libsmbldap0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515985" comment="libtevent-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515986" comment="libtevent-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515987" comment="libwbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515988" comment="libwbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515989" comment="samba-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515990" comment="samba-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515991" comment="samba-client-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515992" comment="samba-client-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515993" comment="samba-doc-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515994" comment="samba-libs-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515995" comment="samba-libs-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515996" comment="samba-winbind-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515997" comment="samba-winbind-32bit-4.2.4-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516952" comment="libdcerpc-binding0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516953" comment="libdcerpc-binding0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516954" comment="libdcerpc0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516955" comment="libdcerpc0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516956" comment="libgensec0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516957" comment="libgensec0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516958" comment="libndr-krb5pac0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516959" comment="libndr-krb5pac0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516960" comment="libndr-nbt0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516961" comment="libndr-nbt0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516962" comment="libndr-standard0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516963" comment="libndr-standard0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516964" comment="libndr0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516965" comment="libndr0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516966" comment="libnetapi0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516967" comment="libnetapi0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516968" comment="libregistry0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516969" comment="libsamba-credentials0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516970" comment="libsamba-credentials0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516971" comment="libsamba-hostconfig0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516972" comment="libsamba-hostconfig0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516973" comment="libsamba-passdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516974" comment="libsamba-passdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516975" comment="libsamba-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516976" comment="libsamba-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516977" comment="libsamdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516978" comment="libsamdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516979" comment="libsmbclient-raw0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516980" comment="libsmbclient-raw0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516981" comment="libsmbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516982" comment="libsmbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516983" comment="libsmbconf0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516984" comment="libsmbconf0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516985" comment="libsmbldap0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516986" comment="libsmbldap0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516987" comment="libtevent-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516988" comment="libtevent-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516989" comment="libwbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516990" comment="libwbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516991" comment="samba-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516992" comment="samba-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516993" comment="samba-client-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516994" comment="samba-client-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516995" comment="samba-doc-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516996" comment="samba-libs-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516997" comment="samba-libs-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516998" comment="samba-winbind-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516999" comment="samba-winbind-32bit-4.2.4-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="TID7016709" ref_url="https://www.suse.com/support/kb/doc?id=7016709" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980168">SUSE bug 980168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514842" comment="bind-libs-9.9.6P1-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514843" comment="bind-libs-32bit-9.9.6P1-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514844" comment="bind-utils-9.9.6P1-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5539" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5539" ref_url="https://www.suse.com/security/cve/CVE-2015-5539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5539/">CVE-2015-5539</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5540" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5540" ref_url="https://www.suse.com/security/cve/CVE-2015-5540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5540/">CVE-2015-5540</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5541" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5541" ref_url="https://www.suse.com/security/cve/CVE-2015-5541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5129.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5541/">CVE-2015-5541</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5544" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5544" ref_url="https://www.suse.com/security/cve/CVE-2015-5544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5544/">CVE-2015-5544</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5545" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5545" ref_url="https://www.suse.com/security/cve/CVE-2015-5545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5545/">CVE-2015-5545</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5546" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5546" ref_url="https://www.suse.com/security/cve/CVE-2015-5546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5546/">CVE-2015-5546</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5547" ref_url="https://www.suse.com/security/cve/CVE-2015-5547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5547/">CVE-2015-5547</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5548" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5548" ref_url="https://www.suse.com/security/cve/CVE-2015-5548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5548/">CVE-2015-5548</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5549" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5549" ref_url="https://www.suse.com/security/cve/CVE-2015-5549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5549/">CVE-2015-5549</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5550" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5550" ref_url="https://www.suse.com/security/cve/CVE-2015-5550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5550/">CVE-2015-5550</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5551" ref_url="https://www.suse.com/security/cve/CVE-2015-5551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5551/">CVE-2015-5551</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5552" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5552" ref_url="https://www.suse.com/security/cve/CVE-2015-5552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5552/">CVE-2015-5552</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5553" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5553" ref_url="https://www.suse.com/security/cve/CVE-2015-5553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, and CVE-2015-5552.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5553/">CVE-2015-5553</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5554" ref_url="https://www.suse.com/security/cve/CVE-2015-5554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5555, CVE-2015-5558, and CVE-2015-5562.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5554/">CVE-2015-5554</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5555" ref_url="https://www.suse.com/security/cve/CVE-2015-5555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5558, and CVE-2015-5562.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5555/">CVE-2015-5555</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5556" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5556" ref_url="https://www.suse.com/security/cve/CVE-2015-5556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5556/">CVE-2015-5556</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5557" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5557" ref_url="https://www.suse.com/security/cve/CVE-2015-5557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5557/">CVE-2015-5557</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5558" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5558" ref_url="https://www.suse.com/security/cve/CVE-2015-5558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5555, and CVE-2015-5562.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5558/">CVE-2015-5558</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5559" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5559" ref_url="https://www.suse.com/security/cve/CVE-2015-5559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5559/">CVE-2015-5559</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5560" ref_url="https://www.suse.com/security/cve/CVE-2015-5560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5560/">CVE-2015-5560</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5561" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5561" ref_url="https://www.suse.com/security/cve/CVE-2015-5561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5561/">CVE-2015-5561</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5562" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5562" ref_url="https://www.suse.com/security/cve/CVE-2015-5562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5555, and CVE-2015-5558.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5562/">CVE-2015-5562</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5563" ref_url="https://www.suse.com/security/cve/CVE-2015-5563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5563/">CVE-2015-5563</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5567" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5567" ref_url="https://www.suse.com/security/cve/CVE-2015-5567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5579.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5567/">CVE-2015-5567</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5568" ref_url="https://www.suse.com/security/cve/CVE-2015-5568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to cause a denial of service (vector-length corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5568/">CVE-2015-5568</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5569" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5569" ref_url="https://www.suse.com/security/cve/CVE-2015-5569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 improperly implement the Flash broker API, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5569/">CVE-2015-5569</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5570" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5570" ref_url="https://www.suse.com/security/cve/CVE-2015-5570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5570/">CVE-2015-5570</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5571" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5571" ref_url="https://www.suse.com/security/cve/CVE-2015-5571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.  NOTE: this issue exists because of an incomplete fix for CVE-2014-4671 and CVE-2014-5333.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5571/">CVE-2015-5571</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5572" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5572" ref_url="https://www.suse.com/security/cve/CVE-2015-5572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5572/">CVE-2015-5572</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5573" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5573" ref_url="https://www.suse.com/security/cve/CVE-2015-5573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5573/">CVE-2015-5573</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5574" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5574" ref_url="https://www.suse.com/security/cve/CVE-2015-5574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5574/">CVE-2015-5574</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5575" ref_url="https://www.suse.com/security/cve/CVE-2015-5575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5575/">CVE-2015-5575</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5576" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5576" ref_url="https://www.suse.com/security/cve/CVE-2015-5576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5576/">CVE-2015-5576</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5577" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5577" ref_url="https://www.suse.com/security/cve/CVE-2015-5577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5577/">CVE-2015-5577</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5578" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5578" ref_url="https://www.suse.com/security/cve/CVE-2015-5578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5578/">CVE-2015-5578</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5579" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5579" ref_url="https://www.suse.com/security/cve/CVE-2015-5579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5567.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5579/">CVE-2015-5579</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5580" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5580" ref_url="https://www.suse.com/security/cve/CVE-2015-5580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5580/">CVE-2015-5580</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5581" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5581" ref_url="https://www.suse.com/security/cve/CVE-2015-5581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5584, and CVE-2015-6682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5581/">CVE-2015-5581</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5582" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5582" ref_url="https://www.suse.com/security/cve/CVE-2015-5582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5582/">CVE-2015-5582</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5584" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5584" ref_url="https://www.suse.com/security/cve/CVE-2015-5584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, and CVE-2015-6682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5584/">CVE-2015-5584</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5587" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5587" ref_url="https://www.suse.com/security/cve/CVE-2015-5587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5587/">CVE-2015-5587</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5588" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5588" ref_url="https://www.suse.com/security/cve/CVE-2015-5588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5588/">CVE-2015-5588</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<bugzilla href="https://bugzilla.suse.com/1009988">SUSE bug 1009988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943504">SUSE bug 943504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945985">SUSE bug 945985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954457">SUSE bug 954457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957883">SUSE bug 957883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114322" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114325" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514987" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514988" comment="openssh-askpass-gnome-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514989" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001593.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<bugzilla href="https://bugzilla.suse.com/1111123">SUSE bug 1111123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512467" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512468" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512469" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512470" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512471" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514991" comment="libsnmp30-5.7.2.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514992" comment="libsnmp30-32bit-5.7.2.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514993" comment="net-snmp-5.7.2.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514994" comment="perl-SNMP-5.7.2.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514995" comment="snmp-mibs-5.7.2.1-4.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5697" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5697" ref_url="https://www.suse.com/security/cve/CVE-2015-5697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
    <description>
    The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5697/">CVE-2015-5697</cve>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515038" comment="kernel-default-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515039" comment="kernel-default-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515040" comment="kernel-default-extra-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515041" comment="kernel-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515042" comment="kernel-macros-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515043" comment="kernel-source-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515044" comment="kernel-syms-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515045" comment="kernel-xen-3.12.48-52.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515046" comment="kernel-xen-devel-3.12.48-52.27.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940342">SUSE bug 940342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00002.html" source="SUSE-SU"/>
    <description>
    buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944107">SUSE bug 944107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514953" comment="bind-libs-9.9.6P1-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514954" comment="bind-libs-32bit-9.9.6P1-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514955" comment="bind-utils-9.9.6P1-26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5788" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5788" ref_url="https://www.suse.com/security/cve/CVE-2015-5788" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5788/">CVE-2015-5788</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5794" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5794" ref_url="https://www.suse.com/security/cve/CVE-2015-5794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5794/">CVE-2015-5794</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5801" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5801" ref_url="https://www.suse.com/security/cve/CVE-2015-5801" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5801/">CVE-2015-5801</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5809" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5809" ref_url="https://www.suse.com/security/cve/CVE-2015-5809" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5809/">CVE-2015-5809</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5822" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5822" ref_url="https://www.suse.com/security/cve/CVE-2015-5822" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5822/">CVE-2015-5822</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5928" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5928" ref_url="https://www.suse.com/security/cve/CVE-2015-5928" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5928/">CVE-2015-5928</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5969" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00050.html" source="SUSE-SU"/>
    <description>
    The mysql-systemd-helper script in the mysql-community-server package before 5.6.28-2.17.1 in openSUSE 13.2 and before 5.6.28-13.1 in openSUSE Leap 42.1 and the mariadb package before 10.0.22-2.21.2 in openSUSE 13.2 and before 10.0.22-3.1 in SUSE Linux Enterprise (SLE) 12.1 and openSUSE Leap 42.1 allows local users to discover database credentials by listing a process and its arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<bugzilla href="https://bugzilla.suse.com/957174">SUSE bug 957174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 does not properly terminate a data structure after a failure to locate a number within a string, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6242" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allows remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6243" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6244" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6246" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6248" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6249" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00001.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<bugzilla href="https://bugzilla.suse.com/941794">SUSE bug 941794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514981" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514982" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514983" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515038" comment="kernel-default-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515039" comment="kernel-default-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515040" comment="kernel-default-extra-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515041" comment="kernel-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515042" comment="kernel-macros-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515043" comment="kernel-source-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515044" comment="kernel-syms-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515045" comment="kernel-xen-3.12.48-52.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515046" comment="kernel-xen-devel-3.12.48-52.27.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6502" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6502" ref_url="https://www.suse.com/security/cve/CVE-2015-6502" source="SUSE CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the console in Puppet Enterprise before 2015.2.1 allows remote attackers to inject arbitrary web script or HTML via the string parameter, related to Login Redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-6502/">CVE-2015-6502</cve>
	<bugzilla href="https://bugzilla.suse.com/1072338">SUSE bug 1072338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334293" comment="puppet is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6525" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6525" ref_url="https://www.suse.com/security/cve/CVE-2015-6525" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6525/">CVE-2015-6525</cve>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943011">SUSE bug 943011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338885" comment="libevent is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6526" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6526" ref_url="https://www.suse.com/security/cve/CVE-2015-6526" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel before 4.0.2 on ppc64 platforms allows local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6526/">CVE-2015-6526</cve>
	<bugzilla href="https://bugzilla.suse.com/942702">SUSE bug 942702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114322" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114325" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514987" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514988" comment="openssh-askpass-gnome-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514989" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942850">SUSE bug 942850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114322" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114325" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514987" comment="openssh-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514988" comment="openssh-askpass-gnome-6.6p1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514989" comment="openssh-helpers-6.6p1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6654" ref_url="https://www.suse.com/security/cve/CVE-2015-6654" source="SUSE CVE"/>
    <description>
    The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x, 4.4.x, and earlier does not limit the number of printk console messages when reporting a failure to retrieve a reference on a foreign page, which allows remote domains to cause a denial of service by leveraging permissions to map the memory of a foreign guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6654/">CVE-2015-6654</cve>
	<bugzilla href="https://bugzilla.suse.com/942657">SUSE bug 942657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6676" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6676" ref_url="https://www.suse.com/security/cve/CVE-2015-6676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6678.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6676/">CVE-2015-6676</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6677" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6677" ref_url="https://www.suse.com/security/cve/CVE-2015-6677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, and CVE-2015-5588.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6677/">CVE-2015-6677</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6678" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6678" ref_url="https://www.suse.com/security/cve/CVE-2015-6678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6676.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6678/">CVE-2015-6678</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6679" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6679" ref_url="https://www.suse.com/security/cve/CVE-2015-6679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6679/">CVE-2015-6679</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6682" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6682" ref_url="https://www.suse.com/security/cve/CVE-2015-6682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, and CVE-2015-5584.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6682/">CVE-2015-6682</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the aiff_open function in oggenc/audio.c in vorbis-tools 1.4.0 and earlier allows remote attackers to cause a denial of service (crash) via a crafted AIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<bugzilla href="https://bugzilla.suse.com/943795">SUSE bug 943795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515066" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515067" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00001.html" source="SUSE-SU"/>
    <description>
    The MScrollV function in ansi.c in GNU screen 4.3.1 and earlier does not properly limit recursion, which allows remote attackers to cause a denial of service (stack consumption) via an escape sequence with a large repeat count value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806</cve>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521211" comment="screen-4.0.4-23.3.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515134" comment="xen-4.4.3_02-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515135" comment="xen-kmp-default-4.4.3_02_k3.12.48_52.27-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515136" comment="xen-libs-4.4.3_02-22.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515137" comment="xen-libs-32bit-4.4.3_02-22.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965156">SUSE bug 965156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515074" comment="qemu-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515075" comment="qemu-block-curl-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515076" comment="qemu-ipxe-1.0.0-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515077" comment="qemu-kvm-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515078" comment="qemu-seabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515079" comment="qemu-sgabios-8-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515080" comment="qemu-tools-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515081" comment="qemu-vgabios-1.7.4-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515082" comment="qemu-x86-2.0.2-48.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" source="SUSE-SU"/>
    <description>
    The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140870" comment="libldap-2_4-2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140871" comment="libldap-2_4-2-32bit-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140874" comment="openldap2-client-2.4.41-18.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156765" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156766" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156768" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512344" comment="libldap-2_4-2-2.4.41-18.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512345" comment="libldap-2_4-2-32bit-2.4.41-18.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512346" comment="openldap2-client-2.4.41-18.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515720" comment="libldap-2_4-2-2.4.41-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515721" comment="libldap-2_4-2-32bit-2.4.41-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515722" comment="openldap2-client-2.4.41-18.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6937" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515038" comment="kernel-default-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515039" comment="kernel-default-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515040" comment="kernel-default-extra-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515041" comment="kernel-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515042" comment="kernel-macros-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515043" comment="kernel-source-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515044" comment="kernel-syms-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515045" comment="kernel-xen-3.12.48-52.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515046" comment="kernel-xen-devel-3.12.48-52.27.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129286" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129287" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155320" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155321" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155320" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155321" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7184" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7184" ref_url="https://www.suse.com/security/cve/CVE-2015-7184" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00021.html" source="SUSE-SU"/>
    <description>
    The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7184/">CVE-2015-7184</cve>
	<bugzilla href="https://bugzilla.suse.com/950686">SUSE bug 950686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the RTPReceiverVideo::ParseRtpPacket function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 might allow remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a crafted WebRTC RTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to bypass the Same Origin Policy via data: and view-source: URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the Metadata::setData function in MetaData.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memory allocation and application crash) via an MP4 video file with crafted covr metadata that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1705-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141107" comment="rpcbind-0.2.3-21.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142057" comment="rpcbind-0.2.1_rc4-16.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155620" comment="rpcbind-0.2.3-23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515035" comment="rpcbind-0.2.1_rc4-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
    <description>
    hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7509" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<bugzilla href="https://bugzilla.suse.com/956707">SUSE bug 956707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956766">SUSE bug 956766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0575-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00151.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1227-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<bugzilla href="https://bugzilla.suse.com/965902">SUSE bug 965902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156955" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156956" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512320" comment="libgcrypt20-1.6.1-16.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512321" comment="libgcrypt20-32bit-1.6.1-16.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516000" comment="libgcrypt20-1.6.1-16.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516001" comment="libgcrypt20-32bit-1.6.1-16.27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515692" comment="qemu-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515693" comment="qemu-block-curl-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515694" comment="qemu-ipxe-1.0.0-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515695" comment="qemu-kvm-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515696" comment="qemu-seabios-1.7.4-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515697" comment="qemu-sgabios-8-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515698" comment="qemu-tools-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515699" comment="qemu-vgabios-1.7.4-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515700" comment="qemu-x86-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516835" comment="qemu-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516836" comment="qemu-block-curl-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516837" comment="qemu-ipxe-1.0.0-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516838" comment="qemu-kvm-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516839" comment="qemu-seabios-1.8.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516840" comment="qemu-sgabios-8-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516841" comment="qemu-tools-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516842" comment="qemu-vgabios-1.8.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516843" comment="qemu-x86-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513</cve>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7540" ref_url="https://www.suse.com/security/cve/CVE-2015-7540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
    <description>
    The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7540/">CVE-2015-7540</cve>
	<bugzilla href="https://bugzilla.suse.com/958580">SUSE bug 958580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7542" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7542" ref_url="https://www.suse.com/security/cve/CVE-2015-7542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003590.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0094-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00038.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in libgwenhywfar through 4.12.0 due to the usage of outdated bundled CA certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7542/">CVE-2015-7542</cve>
	<bugzilla href="https://bugzilla.suse.com/958331">SUSE bug 958331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009169499" comment="gwenhywfar-lang-4.9.0beta-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169500" comment="gwenhywfar-tools-4.9.0beta-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169501" comment="libgwengui-gtk2-0-4.9.0beta-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169502" comment="libgwenhywfar60-4.9.0beta-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169503" comment="libgwenhywfar60-plugins-4.9.0beta-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519152" comment="gwenhywfar-lang-4.9.0beta-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519153" comment="gwenhywfar-tools-4.9.0beta-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519154" comment="libgwengui-gtk2-0-4.9.0beta-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519155" comment="libgwenhywfar60-4.9.0beta-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519156" comment="libgwenhywfar60-plugins-4.9.0beta-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017265" ref_url="https://www.suse.com/support/kb/doc?id=7017265" source="SUSE-SU"/>
		<reference ref_id="TID7017273" ref_url="https://www.suse.com/support/kb/doc/?id=7017273" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017329" ref_url="https://www.suse.com/support/kb/doc/?id=7017329" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<bugzilla href="https://bugzilla.suse.com/1077097">SUSE bug 1077097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967061">SUSE bug 967061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967072">SUSE bug 967072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967496">SUSE bug 967496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969216">SUSE bug 969216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969241">SUSE bug 969241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515782" comment="glibc-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515783" comment="glibc-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515784" comment="glibc-devel-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515785" comment="glibc-devel-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515786" comment="glibc-i18ndata-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515787" comment="glibc-locale-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515788" comment="glibc-locale-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515789" comment="nscd-2.19-22.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516844" comment="glibc-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516845" comment="glibc-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516846" comment="glibc-devel-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516847" comment="glibc-devel-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516848" comment="glibc-i18ndata-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516849" comment="glibc-locale-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516850" comment="glibc-locale-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516851" comment="nscd-2.19-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958918">SUSE bug 958918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library.  NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<bugzilla href="https://bugzilla.suse.com/939860">SUSE bug 939860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517305" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517306" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517307" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gdk_pixbuf_flip function in gdk-pixbuf-scale.c in gdk-pixbuf 2.30.x allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158993" comment="gdk-pixbuf-lang-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158994" comment="gdk-pixbuf-query-loaders-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158995" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158996" comment="libgdk_pixbuf-2_0-0-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158997" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158998" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515723" comment="gdk-pixbuf-lang-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515724" comment="gdk-pixbuf-query-loaders-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515725" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515726" comment="libgdk_pixbuf-2_0-0-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515727" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515728" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333993" comment="gtk2 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515723" comment="gdk-pixbuf-lang-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515724" comment="gdk-pixbuf-query-loaders-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515725" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515726" comment="libgdk_pixbuf-2_0-0-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515727" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515728" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515681" comment="libtiff5-4.0.6-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515682" comment="libtiff5-32bit-4.0.6-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519147" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519148" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001821.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0201-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00117.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in giffix.c in giffix in giflib 5.1.1 allows attackers to cause a denial of service (program crash) via crafted image and logical screen width fields in a GIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515709" comment="libgif6-5.0.5-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515710" comment="libgif6-32bit-5.0.5-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7559" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7559" ref_url="https://www.suse.com/security/cve/CVE-2015-7559" source="SUSE CVE"/>
    <description>
    It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7559/">CVE-2015-7559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0877-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515845" comment="libdcerpc-binding0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515846" comment="libdcerpc-binding0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515847" comment="libdcerpc0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515848" comment="libdcerpc0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515849" comment="libgensec0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515850" comment="libgensec0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515851" comment="libndr-krb5pac0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515852" comment="libndr-krb5pac0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515853" comment="libndr-nbt0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515854" comment="libndr-nbt0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515855" comment="libndr-standard0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515856" comment="libndr-standard0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515857" comment="libndr0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515858" comment="libndr0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515859" comment="libnetapi0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515860" comment="libnetapi0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515861" comment="libpdb0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515862" comment="libpdb0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515863" comment="libregistry0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515864" comment="libsamba-credentials0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515865" comment="libsamba-credentials0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515866" comment="libsamba-hostconfig0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515867" comment="libsamba-hostconfig0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515868" comment="libsamba-util0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515869" comment="libsamba-util0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515870" comment="libsamdb0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515871" comment="libsamdb0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515872" comment="libsmbclient-raw0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515873" comment="libsmbclient-raw0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515874" comment="libsmbclient0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515875" comment="libsmbclient0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515876" comment="libsmbconf0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515877" comment="libsmbconf0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515878" comment="libsmbldap0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515879" comment="libsmbldap0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515880" comment="libtevent-util0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515881" comment="libtevent-util0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515882" comment="libwbclient0-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515883" comment="libwbclient0-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515884" comment="samba-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515885" comment="samba-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515886" comment="samba-client-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515887" comment="samba-client-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515888" comment="samba-doc-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515889" comment="samba-libs-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515890" comment="samba-libs-32bit-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515891" comment="samba-winbind-4.1.12-18.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515892" comment="samba-winbind-32bit-4.1.12-18.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516870" comment="libdcerpc-binding0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516871" comment="libdcerpc-binding0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516872" comment="libdcerpc0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516873" comment="libdcerpc0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516874" comment="libgensec0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516875" comment="libgensec0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516876" comment="libndr-krb5pac0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516877" comment="libndr-krb5pac0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516878" comment="libndr-nbt0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516879" comment="libndr-nbt0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516880" comment="libndr-standard0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516881" comment="libndr-standard0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516882" comment="libndr0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516883" comment="libndr0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516884" comment="libnetapi0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516885" comment="libnetapi0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516886" comment="libregistry0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516887" comment="libsamba-credentials0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516888" comment="libsamba-credentials0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516889" comment="libsamba-hostconfig0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516890" comment="libsamba-hostconfig0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516891" comment="libsamba-passdb0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516892" comment="libsamba-passdb0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516893" comment="libsamba-util0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516894" comment="libsamba-util0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516895" comment="libsamdb0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516896" comment="libsamdb0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516897" comment="libsmbclient-raw0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516898" comment="libsmbclient-raw0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516899" comment="libsmbclient0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516900" comment="libsmbclient0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516901" comment="libsmbconf0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516902" comment="libsmbconf0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516903" comment="libsmbldap0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516904" comment="libsmbldap0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516905" comment="libtevent-util0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516906" comment="libtevent-util0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516907" comment="libwbclient0-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516908" comment="libwbclient0-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516909" comment="samba-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516910" comment="samba-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516911" comment="samba-client-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516912" comment="samba-client-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516913" comment="samba-doc-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516914" comment="samba-libs-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516915" comment="samba-libs-32bit-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516916" comment="samba-winbind-4.2.4-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516917" comment="samba-winbind-32bit-4.2.4-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961280">SUSE bug 961280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961281">SUSE bug 961281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961282">SUSE bug 961282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961283">SUSE bug 961283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961284">SUSE bug 961284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961290">SUSE bug 961290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961357">SUSE bug 961357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967521">SUSE bug 967521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516123" comment="libfreebl3-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516124" comment="libfreebl3-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516125" comment="libsoftokn3-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516126" comment="libsoftokn3-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516127" comment="mozilla-nss-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516128" comment="mozilla-nss-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516129" comment="mozilla-nss-certs-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516130" comment="mozilla-nss-certs-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516131" comment="mozilla-nss-sysinit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516132" comment="mozilla-nss-sysinit-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516133" comment="mozilla-nss-tools-3.19.2.2-32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516123" comment="libfreebl3-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516124" comment="libfreebl3-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516125" comment="libsoftokn3-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516126" comment="libsoftokn3-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516127" comment="mozilla-nss-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516128" comment="mozilla-nss-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516129" comment="mozilla-nss-certs-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516130" comment="mozilla-nss-certs-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516131" comment="mozilla-nss-sysinit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516132" comment="mozilla-nss-sysinit-32bit-3.19.2.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516133" comment="mozilla-nss-tools-3.19.2.2-32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7613" ref_url="https://www.suse.com/security/cve/CVE-2015-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-05"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7613/">CVE-2015-7613</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948536">SUSE bug 948536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948701">SUSE bug 948701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515038" comment="kernel-default-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515039" comment="kernel-default-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515040" comment="kernel-default-extra-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515041" comment="kernel-devel-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515042" comment="kernel-macros-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515043" comment="kernel-source-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515044" comment="kernel-syms-3.12.48-52.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515045" comment="kernel-xen-3.12.48-52.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515046" comment="kernel-xen-devel-3.12.48-52.27.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7625" ref_url="https://www.suse.com/security/cve/CVE-2015-7625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7625/">CVE-2015-7625</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7626" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7626" ref_url="https://www.suse.com/security/cve/CVE-2015-7626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7626/">CVE-2015-7626</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7627" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7627" ref_url="https://www.suse.com/security/cve/CVE-2015-7627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7627/">CVE-2015-7627</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7628" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7628" ref_url="https://www.suse.com/security/cve/CVE-2015-7628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7628/">CVE-2015-7628</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7629" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7629" ref_url="https://www.suse.com/security/cve/CVE-2015-7629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextFormat object with a crafted tabStops property, a different vulnerability than CVE-2015-7631, CVE-2015-7643, and CVE-2015-7644.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7629/">CVE-2015-7629</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7630" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7630" ref_url="https://www.suse.com/security/cve/CVE-2015-7630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7633, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7630/">CVE-2015-7630</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7631" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7631" ref_url="https://www.suse.com/security/cve/CVE-2015-7631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextLine object with a crafted validity property, a different vulnerability than CVE-2015-7629, CVE-2015-7643, and CVE-2015-7644.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7631/">CVE-2015-7631</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7632" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7632" ref_url="https://www.suse.com/security/cve/CVE-2015-7632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a Loader object with a crafted loaderBytes property.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7632/">CVE-2015-7632</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7633" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7633" ref_url="https://www.suse.com/security/cve/CVE-2015-7633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7633/">CVE-2015-7633</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7634" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7634" ref_url="https://www.suse.com/security/cve/CVE-2015-7634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7633.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7634/">CVE-2015-7634</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7643" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7643" ref_url="https://www.suse.com/security/cve/CVE-2015-7643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a Video object with a crafted deblocking property, a different vulnerability than CVE-2015-7629, CVE-2015-7631, and CVE-2015-7644.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7643/">CVE-2015-7643</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7644" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7644" ref_url="https://www.suse.com/security/cve/CVE-2015-7644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7629, CVE-2015-7631, and CVE-2015-7643.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7644/">CVE-2015-7644</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7645" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7645" ref_url="https://www.suse.com/security/cve/CVE-2015-7645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player 18.x through 18.0.0.252 and 19.x through 19.0.0.207 on Windows and OS X and 11.x through 11.2.202.535 on Linux allows remote attackers to execute arbitrary code via a crafted SWF file, as exploited in the wild in October 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7645/">CVE-2015-7645</cve>
	<bugzilla href="https://bugzilla.suse.com/950474">SUSE bug 950474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515068" comment="flash-player-11.2.202.540-108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515069" comment="flash-player-gnome-11.2.202.540-108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7651" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7651" ref_url="https://www.suse.com/security/cve/CVE-2015-7651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted DefineFunction atoms, a different vulnerability than CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7651/">CVE-2015-7651</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7652" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7652" ref_url="https://www.suse.com/security/cve/CVE-2015-7652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted gridFitType property value, a different vulnerability than CVE-2015-7651, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7652/">CVE-2015-7652</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7653" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7653" ref_url="https://www.suse.com/security/cve/CVE-2015-7653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted globalToLocal arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7653/">CVE-2015-7653</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7654" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7654" ref_url="https://www.suse.com/security/cve/CVE-2015-7654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted attachSound arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7654/">CVE-2015-7654</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7655" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7655" ref_url="https://www.suse.com/security/cve/CVE-2015-7655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionExtends arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7655/">CVE-2015-7655</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7656" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7656" ref_url="https://www.suse.com/security/cve/CVE-2015-7656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionImplementsOp arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7656/">CVE-2015-7656</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7657" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7657" ref_url="https://www.suse.com/security/cve/CVE-2015-7657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionCallMethod arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7657/">CVE-2015-7657</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7658" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7658" ref_url="https://www.suse.com/security/cve/CVE-2015-7658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionInstanceOf arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7658/">CVE-2015-7658</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7659" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7659" ref_url="https://www.suse.com/security/cve/CVE-2015-7659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion" in the NetConnection object implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7659/">CVE-2015-7659</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7660" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7660" ref_url="https://www.suse.com/security/cve/CVE-2015-7660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted setMask arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7660/">CVE-2015-7660</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7661" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7661" ref_url="https://www.suse.com/security/cve/CVE-2015-7661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted getBounds call, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7661/">CVE-2015-7661</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7662" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7662" ref_url="https://www.suse.com/security/cve/CVE-2015-7662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allow remote attackers to bypass intended access restrictions and write to files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7662/">CVE-2015-7662</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7663" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7663" ref_url="https://www.suse.com/security/cve/CVE-2015-7663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7663/">CVE-2015-7663</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158993" comment="gdk-pixbuf-lang-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158994" comment="gdk-pixbuf-query-loaders-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158995" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158996" comment="libgdk_pixbuf-2_0-0-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158997" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158998" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515368" comment="gdk-pixbuf-lang-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515369" comment="gdk-pixbuf-query-loaders-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515370" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515371" comment="libgdk_pixbuf-2_0-0-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515372" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515373" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158993" comment="gdk-pixbuf-lang-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158994" comment="gdk-pixbuf-query-loaders-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158995" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158996" comment="libgdk_pixbuf-2_0-0-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158997" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158998" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515368" comment="gdk-pixbuf-lang-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515369" comment="gdk-pixbuf-query-loaders-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515370" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515371" comment="libgdk_pixbuf-2_0-0-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515372" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515373" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations.  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2529-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520123" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2529-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697</cve>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520123" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7747" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1903-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00029.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the afReadFrames function in audiofile (aka libaudiofile and Audio File Library) allows user-assisted remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted audio file, as demonstrated by sixteen-stereo-to-eight-mono.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747</cve>
	<bugzilla href="https://bugzilla.suse.com/949399">SUSE bug 949399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1995-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515282" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515283" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7810" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7810" ref_url="https://www.suse.com/security/cve/CVE-2015-7810" source="SUSE CVE"/>
    <description>
    libbluray MountManager class has a time-of-check time-of-use (TOCTOU) race when expanding JAR files
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7810/">CVE-2015-7810</cve>
	<bugzilla href="https://bugzilla.suse.com/1160757">SUSE bug 1160757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338887" comment="libbluray is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7812" ref_url="https://www.suse.com/security/cve/CVE-2015-7812" source="SUSE CVE"/>
    <description>
    The hypercall_create_continuation function in arch/arm/domain.c in Xen 4.4.x through 4.6.x allows local guest users to cause a denial of service (host crash) via a preemptible hypercall to the multicall interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7812/">CVE-2015-7812</cve>
	<bugzilla href="https://bugzilla.suse.com/950171">SUSE bug 950171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7813" ref_url="https://www.suse.com/security/cve/CVE-2015-7813" source="SUSE CVE"/>
    <description>
    Xen 4.4.x, 4.5.x, and 4.6.x does not limit the number of printk console messages when reporting unimplemented hypercalls, which allows local guests to cause a denial of service via a sequence of (1) HYPERVISOR_physdev_op hypercalls, which are not properly handled in the do_physdev_op function in arch/arm/physdev.c, or (2) HYPERVISOR_hvm_op hypercalls, which are not properly handled in the do_hvm_op function in arch/arm/hvm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7813/">CVE-2015-7813</cve>
	<bugzilla href="https://bugzilla.suse.com/950172">SUSE bug 950172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7814" ref_url="https://www.suse.com/security/cve/CVE-2015-7814" source="SUSE CVE"/>
    <description>
    Race condition in the relinquish_memory function in arch/arm/domain.c in Xen 4.6.x and earlier allows local domains with partial management control to cause a denial of service (host crash) via vectors involving the destruction of a domain and using XENMEM_decrease_reservation to reduce the memory of the domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7814/">CVE-2015-7814</cve>
	<bugzilla href="https://bugzilla.suse.com/950173">SUSE bug 950173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
    <description>
    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7837" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7837" ref_url="https://www.suse.com/security/cve/CVE-2015-7837" source="SUSE CVE"/>
    <description>
    The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7837/">CVE-2015-7837</cve>
	<bugzilla href="https://bugzilla.suse.com/950804">SUSE bug 950804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952606">SUSE bug 952606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951542">SUSE bug 951542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516145" comment="kernel-default-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516146" comment="kernel-default-devel-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516147" comment="kernel-default-extra-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516148" comment="kernel-devel-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516149" comment="kernel-macros-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516150" comment="kernel-source-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516151" comment="kernel-syms-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516152" comment="kernel-xen-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516153" comment="kernel-xen-devel-3.12.51-60.20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7884" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-18"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951626">SUSE bug 951626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951627">SUSE bug 951627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7885" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-21"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951626">SUSE bug 951626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951627">SUSE bug 951627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7940" ref_url="https://www.suse.com/security/cve/CVE-2015-7940" source="SUSE CVE"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html" source="SUSE-SU"/>
    <description>
    The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7940/">CVE-2015-7940</cve>
	<bugzilla href="https://bugzilla.suse.com/951727">SUSE bug 951727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2136-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00046.html" source="SUSE-SU"/>
    <description>
    The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515284" comment="libpng12-0-1.2.50-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515285" comment="libpng12-0-32bit-1.2.50-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334102" comment="libpng16 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516145" comment="kernel-default-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516146" comment="kernel-default-devel-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516147" comment="kernel-default-extra-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516148" comment="kernel-devel-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516149" comment="kernel-macros-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516150" comment="kernel-source-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516151" comment="kernel-syms-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516152" comment="kernel-xen-3.12.51-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516153" comment="kernel-xen-devel-3.12.51-60.20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00123.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155536" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155537" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155538" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517365" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517366" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517367" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00042.html" source="SUSE-SU"/>
    <description>
    db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514538" comment="bind-libs-9.9.6P1-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514539" comment="bind-libs-32bit-9.9.6P1-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514540" comment="bind-utils-9.9.6P1-28.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516134" comment="bind-libs-9.9.6P1-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516135" comment="bind-libs-32bit-9.9.6P1-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516136" comment="bind-utils-9.9.6P1-32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8023" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2103-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00139.html" source="SUSE-SU"/>
    <description>
    The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515355" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515356" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515357" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515358" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8025" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00102.html" source="SUSE-SU"/>
    <description>
    driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119273" comment="xscreensaver-5.22-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119274" comment="xscreensaver-data-5.22-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515289" comment="xscreensaver-5.22-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515290" comment="xscreensaver-data-5.22-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954429">SUSE bug 954429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<bugzilla href="https://bugzilla.suse.com/937419">SUSE bug 937419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516416" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8042" ref_url="https://www.suse.com/security/cve/CVE-2015-8042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted loadSound call, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8042/">CVE-2015-8042</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8043" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8043" ref_url="https://www.suse.com/security/cve/CVE-2015-8043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8043/">CVE-2015-8043</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8044" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8044" ref_url="https://www.suse.com/security/cve/CVE-2015-8044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8044/">CVE-2015-8044</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8045" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8045" ref_url="https://www.suse.com/security/cve/CVE-2015-8045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8045/">CVE-2015-8045</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8046" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8046" ref_url="https://www.suse.com/security/cve/CVE-2015-8046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8044.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8046/">CVE-2015-8046</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8047" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8047" ref_url="https://www.suse.com/security/cve/CVE-2015-8047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8047/">CVE-2015-8047</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8048" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8048" ref_url="https://www.suse.com/security/cve/CVE-2015-8048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8048/">CVE-2015-8048</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8049" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8049" ref_url="https://www.suse.com/security/cve/CVE-2015-8049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the TextField object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted autoSize property value, a different vulnerability than CVE-2015-8048, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8049/">CVE-2015-8049</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8050" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8050" ref_url="https://www.suse.com/security/cve/CVE-2015-8050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted beginGradientFill call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8050/">CVE-2015-8050</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8055" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8055" ref_url="https://www.suse.com/security/cve/CVE-2015-8055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8055/">CVE-2015-8055</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8056" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8056" ref_url="https://www.suse.com/security/cve/CVE-2015-8056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8056/">CVE-2015-8056</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8057" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8057" ref_url="https://www.suse.com/security/cve/CVE-2015-8057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8057/">CVE-2015-8057</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8058" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8058" ref_url="https://www.suse.com/security/cve/CVE-2015-8058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8058/">CVE-2015-8058</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8059" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8059" ref_url="https://www.suse.com/security/cve/CVE-2015-8059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8059/">CVE-2015-8059</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8060" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8060" ref_url="https://www.suse.com/security/cve/CVE-2015-8060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8060/">CVE-2015-8060</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8061" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8061" ref_url="https://www.suse.com/security/cve/CVE-2015-8061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8061/">CVE-2015-8061</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8062" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8062" ref_url="https://www.suse.com/security/cve/CVE-2015-8062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8062/">CVE-2015-8062</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8063" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8063" ref_url="https://www.suse.com/security/cve/CVE-2015-8063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8063/">CVE-2015-8063</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8064" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8064" ref_url="https://www.suse.com/security/cve/CVE-2015-8064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8064/">CVE-2015-8064</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8065" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8065" ref_url="https://www.suse.com/security/cve/CVE-2015-8065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8065/">CVE-2015-8065</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8066" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8066" ref_url="https://www.suse.com/security/cve/CVE-2015-8066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8066/">CVE-2015-8066</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8067" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8067" ref_url="https://www.suse.com/security/cve/CVE-2015-8067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8067/">CVE-2015-8067</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8068" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8068" ref_url="https://www.suse.com/security/cve/CVE-2015-8068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8068/">CVE-2015-8068</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8069" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8069" ref_url="https://www.suse.com/security/cve/CVE-2015-8069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8069/">CVE-2015-8069</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8070" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8070" ref_url="https://www.suse.com/security/cve/CVE-2015-8070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8070/">CVE-2015-8070</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8071" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8071" ref_url="https://www.suse.com/security/cve/CVE-2015-8071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8071/">CVE-2015-8071</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8075" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1995-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515282" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515283" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8079" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8079" ref_url="https://www.suse.com/security/cve/CVE-2015-8079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002293.html" source="SUSE-SU"/>
    <description>
    qt5-qtwebkit before 5.4 records private browsing URLs to its favicon database, WebpageIcons.db.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8079/">CVE-2015-8079</cve>
	<bugzilla href="https://bugzilla.suse.com/954210">SUSE bug 954210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140736" comment="libQt5WebKit5-5.6.1-9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140737" comment="libQt5WebKit5-imports-5.6.1-9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140738" comment="libQt5WebKitWidgets5-5.6.1-9.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159059" comment="libQt5WebKit5-5.6.2-1.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159060" comment="libQt5WebKit5-imports-5.6.2-1.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159061" comment="libQt5WebKitWidgets5-5.6.2-1.31 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516424" comment="at-3.1.14-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516425" comment="bogofilter-1.2.4-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516426" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516427" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516428" comment="libbonobo-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516429" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516430" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516431" comment="libkde4-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516432" comment="libkde4-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516433" comment="libkdecore4-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516434" comment="libkdecore4-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516435" comment="libksuseinstall1-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516436" comment="libksuseinstall1-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516437" comment="libnetpbm11-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516438" comment="libnetpbm11-32bit-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516439" comment="netpbm-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516440" comment="openslp-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516441" comment="openslp-32bit-2.0.0-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2136-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2262-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2263-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0103-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0104-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0105-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0729-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00046.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969333">SUSE bug 969333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515805" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515806" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515731" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515732" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515805" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515806" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516863" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515731" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515732" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974668">SUSE bug 974668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8139" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8140" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8215" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8239" ref_url="https://www.suse.com/security/cve/CVE-2015-8239" source="SUSE CVE"/>
    <description>
    The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 allows local users with write permissions to parts of the called command to replace them before it is executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8239/">CVE-2015-8239</cve>
	<bugzilla href="https://bugzilla.suse.com/955994">SUSE bug 955994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
    <description>
    GnuTLS incorrectly validates the first byte of padding in CBC modes
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1455-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00132.html" source="SUSE-SU"/>
    <description>
    The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516052" comment="openssh-6.6p1-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516053" comment="openssh-askpass-gnome-6.6p1-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516054" comment="openssh-helpers-6.6p1-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2367-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0179-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html" source="SUSE-SU"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516008" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516009" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516010" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516011" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515692" comment="qemu-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515693" comment="qemu-block-curl-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515694" comment="qemu-ipxe-1.0.0-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515695" comment="qemu-kvm-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515696" comment="qemu-seabios-1.7.4-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515697" comment="qemu-sgabios-8-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515698" comment="qemu-tools-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515699" comment="qemu-vgabios-1.7.4-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515700" comment="qemu-x86-2.0.2-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516835" comment="qemu-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516836" comment="qemu-block-curl-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516837" comment="qemu-ipxe-1.0.0-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516838" comment="qemu-kvm-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516839" comment="qemu-seabios-1.8.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516840" comment="qemu-sgabios-8-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516841" comment="qemu-tools-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516842" comment="qemu-vgabios-1.8.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516843" comment="qemu-x86-2.3.1-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8366" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8366" ref_url="https://www.suse.com/security/cve/CVE-2015-8366" source="SUSE CVE"/>
    <description>
    Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8366/">CVE-2015-8366</cve>
	<bugzilla href="https://bugzilla.suse.com/1006704">SUSE bug 1006704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006717">SUSE bug 1006717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8367" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8367" ref_url="https://www.suse.com/security/cve/CVE-2015-8367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2256-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2729-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00011.html" source="SUSE-SU"/>
    <description>
    The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8367/">CVE-2015-8367</cve>
	<bugzilla href="https://bugzilla.suse.com/1006704">SUSE bug 1006704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006717">SUSE bug 1006717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957517">SUSE bug 957517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140648" comment="grub2-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140650" comment="grub2-i386-pc-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140653" comment="grub2-snapper-plugin-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140654" comment="grub2-systemd-sleep-plugin-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140655" comment="grub2-x86_64-efi-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140656" comment="grub2-x86_64-xen-2.02~beta2-104.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159010" comment="grub2-2.02-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159012" comment="grub2-i386-pc-2.02-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159015" comment="grub2-snapper-plugin-2.02-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159016" comment="grub2-systemd-sleep-plugin-2.02-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159017" comment="grub2-x86_64-efi-2.02-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159018" comment="grub2-x86_64-xen-2.02-2.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512182" comment="grub2-2.02-11.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512183" comment="grub2-i386-pc-2.02-11.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512184" comment="grub2-snapper-plugin-2.02-11.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512185" comment="grub2-systemd-sleep-plugin-2.02-11.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512186" comment="grub2-x86_64-efi-2.02-11.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512187" comment="grub2-x86_64-xen-2.02-11.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514546" comment="grub2-2.02~beta2-56.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514547" comment="grub2-i386-pc-2.02~beta2-56.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514548" comment="grub2-snapper-plugin-2.02~beta2-56.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514549" comment="grub2-x86_64-efi-2.02~beta2-56.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514550" comment="grub2-x86_64-xen-2.02~beta2-56.9.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516137" comment="grub2-2.02~beta2-73.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516138" comment="grub2-i386-pc-2.02~beta2-73.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516139" comment="grub2-snapper-plugin-2.02~beta2-73.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516140" comment="grub2-x86_64-efi-2.02~beta2-73.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516141" comment="grub2-x86_64-xen-2.02~beta2-73.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8382" ref_url="https://www.suse.com/security/cve/CVE-2015-8382" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8382/">CVE-2015-8382</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8383" ref_url="https://www.suse.com/security/cve/CVE-2015-8383" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8383/">CVE-2015-8383</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8384" ref_url="https://www.suse.com/security/cve/CVE-2015-8384" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8384/">CVE-2015-8384</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8387" ref_url="https://www.suse.com/security/cve/CVE-2015-8387" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8387/">CVE-2015-8387</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?=di(?&lt;=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388</cve>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8389" ref_url="https://www.suse.com/security/cve/CVE-2015-8389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8389/">CVE-2015-8389</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8390" ref_url="https://www.suse.com/security/cve/CVE-2015-8390" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8390/">CVE-2015-8390</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8393" ref_url="https://www.suse.com/security/cve/CVE-2015-8393" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8393/">CVE-2015-8393</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8394" ref_url="https://www.suse.com/security/cve/CVE-2015-8394" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the (?(&lt;digits&gt;) and (?(R&lt;digits&gt;) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8394/">CVE-2015-8394</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8395" ref_url="https://www.suse.com/security/cve/CVE-2015-8395" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8395/">CVE-2015-8395</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8401" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8401" ref_url="https://www.suse.com/security/cve/CVE-2015-8401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8401/">CVE-2015-8401</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8402" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8402" ref_url="https://www.suse.com/security/cve/CVE-2015-8402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8402/">CVE-2015-8402</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8403" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8403" ref_url="https://www.suse.com/security/cve/CVE-2015-8403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8403/">CVE-2015-8403</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8404" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8404" ref_url="https://www.suse.com/security/cve/CVE-2015-8404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8404/">CVE-2015-8404</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8405" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8405" ref_url="https://www.suse.com/security/cve/CVE-2015-8405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8405/">CVE-2015-8405</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8406" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8406" ref_url="https://www.suse.com/security/cve/CVE-2015-8406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8406/">CVE-2015-8406</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8407" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8407" ref_url="https://www.suse.com/security/cve/CVE-2015-8407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8457.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8407/">CVE-2015-8407</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8408" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8408" ref_url="https://www.suse.com/security/cve/CVE-2015-8408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8408/">CVE-2015-8408</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8409" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8409" ref_url="https://www.suse.com/security/cve/CVE-2015-8409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-8440 and CVE-2015-8453.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8409/">CVE-2015-8409</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8410" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8410" ref_url="https://www.suse.com/security/cve/CVE-2015-8410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8410/">CVE-2015-8410</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8411" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8411" ref_url="https://www.suse.com/security/cve/CVE-2015-8411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8411/">CVE-2015-8411</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8412" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8412" ref_url="https://www.suse.com/security/cve/CVE-2015-8412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8412/">CVE-2015-8412</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8413" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8413" ref_url="https://www.suse.com/security/cve/CVE-2015-8413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8413/">CVE-2015-8413</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8414" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8414" ref_url="https://www.suse.com/security/cve/CVE-2015-8414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8414/">CVE-2015-8414</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8415" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8415" ref_url="https://www.suse.com/security/cve/CVE-2015-8415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8415/">CVE-2015-8415</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8416" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8416" ref_url="https://www.suse.com/security/cve/CVE-2015-8416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8416/">CVE-2015-8416</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8417" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8417" ref_url="https://www.suse.com/security/cve/CVE-2015-8417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8417/">CVE-2015-8417</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8418" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8418" ref_url="https://www.suse.com/security/cve/CVE-2015-8418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8418/">CVE-2015-8418</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8419" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8419" ref_url="https://www.suse.com/security/cve/CVE-2015-8419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8419/">CVE-2015-8419</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8420" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8420" ref_url="https://www.suse.com/security/cve/CVE-2015-8420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8420/">CVE-2015-8420</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8421" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8421" ref_url="https://www.suse.com/security/cve/CVE-2015-8421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8421/">CVE-2015-8421</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8422" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8422" ref_url="https://www.suse.com/security/cve/CVE-2015-8422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8422/">CVE-2015-8422</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8423" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8423" ref_url="https://www.suse.com/security/cve/CVE-2015-8423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8423/">CVE-2015-8423</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8424" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8424" ref_url="https://www.suse.com/security/cve/CVE-2015-8424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8424/">CVE-2015-8424</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8425" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8425" ref_url="https://www.suse.com/security/cve/CVE-2015-8425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8425/">CVE-2015-8425</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8426" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8426" ref_url="https://www.suse.com/security/cve/CVE-2015-8426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8426/">CVE-2015-8426</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8427" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8427" ref_url="https://www.suse.com/security/cve/CVE-2015-8427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8427/">CVE-2015-8427</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8428" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8428" ref_url="https://www.suse.com/security/cve/CVE-2015-8428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8428/">CVE-2015-8428</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8429" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8429" ref_url="https://www.suse.com/security/cve/CVE-2015-8429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8429/">CVE-2015-8429</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8430" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8430" ref_url="https://www.suse.com/security/cve/CVE-2015-8430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8430/">CVE-2015-8430</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8431" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8431" ref_url="https://www.suse.com/security/cve/CVE-2015-8431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8431/">CVE-2015-8431</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8432" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8432" ref_url="https://www.suse.com/security/cve/CVE-2015-8432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8432/">CVE-2015-8432</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8433" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8433" ref_url="https://www.suse.com/security/cve/CVE-2015-8433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8433/">CVE-2015-8433</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8434" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8434" ref_url="https://www.suse.com/security/cve/CVE-2015-8434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8434/">CVE-2015-8434</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8435" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8435" ref_url="https://www.suse.com/security/cve/CVE-2015-8435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8435/">CVE-2015-8435</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8436" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8436" ref_url="https://www.suse.com/security/cve/CVE-2015-8436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PrintJob object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted addPage arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8436/">CVE-2015-8436</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8437" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8437" ref_url="https://www.suse.com/security/cve/CVE-2015-8437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Selection object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted setFocus call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8437/">CVE-2015-8437</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8438" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8438" ref_url="https://www.suse.com/security/cve/CVE-2015-8438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted XML object that is mishandled during a toString call, a different vulnerability than CVE-2015-8446.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8438/">CVE-2015-8438</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8439" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8439" ref_url="https://www.suse.com/security/cve/CVE-2015-8439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The SharedObject object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code by leveraging an unspecified "type confusion" during a getRemote call, a different vulnerability than CVE-2015-8456.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8439/">CVE-2015-8439</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8440" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8440" ref_url="https://www.suse.com/security/cve/CVE-2015-8440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-8409 and CVE-2015-8453.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8440/">CVE-2015-8440</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8441" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8441" ref_url="https://www.suse.com/security/cve/CVE-2015-8441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8441/">CVE-2015-8441</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8442" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8442" ref_url="https://www.suse.com/security/cve/CVE-2015-8442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted filters property value, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8442/">CVE-2015-8442</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8443" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8443" ref_url="https://www.suse.com/security/cve/CVE-2015-8443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8443/">CVE-2015-8443</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8444" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8444" ref_url="https://www.suse.com/security/cve/CVE-2015-8444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8444/">CVE-2015-8444</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8445" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8445" ref_url="https://www.suse.com/security/cve/CVE-2015-8445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Shader filter implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a large BitmapData source object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8445/">CVE-2015-8445</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8446" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8446" ref_url="https://www.suse.com/security/cve/CVE-2015-8446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via an MP3 file with COMM tags that are mishandled during memory allocation, a different vulnerability than CVE-2015-8438.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8446/">CVE-2015-8446</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8447" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8447" ref_url="https://www.suse.com/security/cve/CVE-2015-8447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Color object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted setTransform arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8447/">CVE-2015-8447</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8448" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8448" ref_url="https://www.suse.com/security/cve/CVE-2015-8448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DisplacementMapFilter object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted mapBitmap property value, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8448/">CVE-2015-8448</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8449" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8449" ref_url="https://www.suse.com/security/cve/CVE-2015-8449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted lineTo method call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8449/">CVE-2015-8449</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8450" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8450" ref_url="https://www.suse.com/security/cve/CVE-2015-8450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted filters property value in a TextField object, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8450/">CVE-2015-8450</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8451" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8451" ref_url="https://www.suse.com/security/cve/CVE-2015-8451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8451/">CVE-2015-8451</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8452" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8452" ref_url="https://www.suse.com/security/cve/CVE-2015-8452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8452/">CVE-2015-8452</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8453" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8453" ref_url="https://www.suse.com/security/cve/CVE-2015-8453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass the ASLR protection mechanism via JIT data, a different vulnerability than CVE-2015-8409 and CVE-2015-8440.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8453/">CVE-2015-8453</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8454" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8454" ref_url="https://www.suse.com/security/cve/CVE-2015-8454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8452.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8454/">CVE-2015-8454</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8455" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8455" ref_url="https://www.suse.com/security/cve/CVE-2015-8455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, and CVE-2015-8451.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8455/">CVE-2015-8455</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8459" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8459" ref_url="https://www.suse.com/security/cve/CVE-2015-8459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8460, CVE-2015-8636, and CVE-2015-8645.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8459/">CVE-2015-8459</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8460" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8460" ref_url="https://www.suse.com/security/cve/CVE-2015-8460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8636, and CVE-2015-8645.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8460/">CVE-2015-8460</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
    <description>
    The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<bugzilla href="https://bugzilla.suse.com/958585">SUSE bug 958585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515385" comment="libdcerpc-binding0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515386" comment="libdcerpc-binding0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515387" comment="libdcerpc0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515388" comment="libdcerpc0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515389" comment="libgensec0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515390" comment="libgensec0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515391" comment="libldb1-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515392" comment="libldb1-32bit-1.1.24-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515393" comment="libndr-krb5pac0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515394" comment="libndr-krb5pac0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515395" comment="libndr-nbt0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515396" comment="libndr-nbt0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515397" comment="libndr-standard0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515398" comment="libndr-standard0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515399" comment="libndr0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515400" comment="libndr0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515401" comment="libnetapi0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515402" comment="libnetapi0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515403" comment="libpdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515404" comment="libpdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515405" comment="libregistry0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515406" comment="libsamba-credentials0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515407" comment="libsamba-credentials0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515408" comment="libsamba-hostconfig0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515409" comment="libsamba-hostconfig0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515410" comment="libsamba-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515411" comment="libsamba-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515412" comment="libsamdb0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515413" comment="libsamdb0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515414" comment="libsmbclient-raw0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515415" comment="libsmbclient-raw0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515416" comment="libsmbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515417" comment="libsmbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515418" comment="libsmbconf0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515419" comment="libsmbconf0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515420" comment="libsmbldap0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515421" comment="libsmbldap0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515422" comment="libtalloc2-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515423" comment="libtalloc2-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515424" comment="libtdb1-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515425" comment="libtdb1-32bit-1.3.8-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515426" comment="libtevent-util0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515427" comment="libtevent-util0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515428" comment="libtevent0-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515429" comment="libtevent0-32bit-0.9.26-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515430" comment="libwbclient0-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515431" comment="libwbclient0-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515432" comment="pytalloc-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515433" comment="pytalloc-32bit-2.1.5-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515434" comment="samba-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515435" comment="samba-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515436" comment="samba-client-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515437" comment="samba-client-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515438" comment="samba-doc-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515439" comment="samba-libs-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515440" comment="samba-libs-32bit-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515441" comment="samba-winbind-4.1.12-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515442" comment="samba-winbind-32bit-4.1.12-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516154" comment="libdcerpc-binding0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516155" comment="libdcerpc-binding0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516156" comment="libdcerpc0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516157" comment="libdcerpc0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516158" comment="libgensec0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516159" comment="libgensec0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516160" comment="libldb1-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516161" comment="libldb1-32bit-1.1.24-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516162" comment="libndr-krb5pac0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516163" comment="libndr-krb5pac0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516164" comment="libndr-nbt0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516165" comment="libndr-nbt0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516166" comment="libndr-standard0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516167" comment="libndr-standard0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516168" comment="libndr0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516169" comment="libndr0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516170" comment="libnetapi0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516171" comment="libnetapi0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516172" comment="libregistry0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516173" comment="libsamba-credentials0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516174" comment="libsamba-credentials0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516175" comment="libsamba-hostconfig0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516176" comment="libsamba-hostconfig0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516177" comment="libsamba-passdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516178" comment="libsamba-passdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516179" comment="libsamba-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516180" comment="libsamba-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516181" comment="libsamdb0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516182" comment="libsamdb0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516183" comment="libsmbclient-raw0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516184" comment="libsmbclient-raw0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516185" comment="libsmbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516186" comment="libsmbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516187" comment="libsmbconf0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516188" comment="libsmbconf0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516189" comment="libsmbldap0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516190" comment="libsmbldap0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516191" comment="libtalloc2-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516192" comment="libtalloc2-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516193" comment="libtdb1-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516194" comment="libtdb1-32bit-1.3.8-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516195" comment="libtevent-util0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516196" comment="libtevent-util0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516197" comment="libtevent0-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516198" comment="libtevent0-32bit-0.9.26-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516199" comment="libwbclient0-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516200" comment="libwbclient0-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516201" comment="pytalloc-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516202" comment="pytalloc-32bit-2.1.5-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516203" comment="samba-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516204" comment="samba-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516205" comment="samba-client-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516206" comment="samba-client-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516207" comment="samba-doc-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516208" comment="samba-libs-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516209" comment="samba-libs-32bit-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516210" comment="samba-winbind-4.2.4-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516211" comment="samba-winbind-32bit-4.2.4-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8470" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8470" ref_url="https://www.suse.com/security/cve/CVE-2015-8470" source="SUSE CVE"/>
    <description>
    The console in Puppet Enterprise 3.7.x, 3.8.x, and 2015.2.x does not set the secure flag for the JSESSIONID cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-8470/">CVE-2015-8470</cve>
	<bugzilla href="https://bugzilla.suse.com/1072341">SUSE bug 1072341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334293" comment="puppet is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8539" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0942-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1037-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00063.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<bugzilla href="https://bugzilla.suse.com/1149680">SUSE bug 1149680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517231" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517232" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517250" comment="libpng15-15-1.5.22-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8553" ref_url="https://www.suse.com/security/cve/CVE-2015-8553" source="SUSE CVE"/>
    <description>
    Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8553/">CVE-2015-8553</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8556" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8556" ref_url="https://www.suse.com/security/cve/CVE-2015-8556" source="SUSE CVE"/>
    <description>
    Local privilege escalation vulnerability in the Gentoo QEMU package before 2.5.0-r1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8556/">CVE-2015-8556</cve>
	<bugzilla href="https://bugzilla.suse.com/958993">SUSE bug 958993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2367-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.4.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via a ; (semicolon) character in a print job, a different vulnerability than CVE-2015-8327.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001890.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0601-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0610-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515791" comment="dhcp-4.2.6-14.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515792" comment="dhcp-client-4.2.6-14.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516852" comment="dhcp-4.3.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516853" comment="dhcp-client-4.3.3-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8607" ref_url="https://www.suse.com/security/cve/CVE-2015-8607" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0881-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html" source="SUSE-SU"/>
    <description>
    The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8607/">CVE-2015-8607</cve>
	<bugzilla href="https://bugzilla.suse.com/961528">SUSE bug 961528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615" source="SUSE CVE"/>
    <description>
    The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of changes to the callback method (HVM_PARAM_CALLBACK_IRQ).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<bugzilla href="https://bugzilla.suse.com/960093">SUSE bug 960093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965269">SUSE bug 965269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515775" comment="krb5-1.12.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515776" comment="krb5-32bit-1.12.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515777" comment="krb5-client-1.12.1-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<bugzilla href="https://bugzilla.suse.com/963964">SUSE bug 963964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515775" comment="krb5-1.12.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515776" comment="krb5-32bit-1.12.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515777" comment="krb5-client-1.12.1-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515775" comment="krb5-1.12.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515776" comment="krb5-32bit-1.12.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515777" comment="krb5-client-1.12.1-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8634" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8634" ref_url="https://www.suse.com/security/cve/CVE-2015-8634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8634/">CVE-2015-8634</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8635" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8635" ref_url="https://www.suse.com/security/cve/CVE-2015-8635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8635/">CVE-2015-8635</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8636" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8636" ref_url="https://www.suse.com/security/cve/CVE-2015-8636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8645.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8636/">CVE-2015-8636</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8638" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8638" ref_url="https://www.suse.com/security/cve/CVE-2015-8638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8638/">CVE-2015-8638</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8639" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8639" ref_url="https://www.suse.com/security/cve/CVE-2015-8639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8639/">CVE-2015-8639</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8640" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8640" ref_url="https://www.suse.com/security/cve/CVE-2015-8640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8640/">CVE-2015-8640</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8641" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8641" ref_url="https://www.suse.com/security/cve/CVE-2015-8641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8641/">CVE-2015-8641</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8642" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8642" ref_url="https://www.suse.com/security/cve/CVE-2015-8642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8642/">CVE-2015-8642</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8643" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8643" ref_url="https://www.suse.com/security/cve/CVE-2015-8643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8643/">CVE-2015-8643</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8644" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8644" ref_url="https://www.suse.com/security/cve/CVE-2015-8644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8644/">CVE-2015-8644</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8645" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8645" ref_url="https://www.suse.com/security/cve/CVE-2015-8645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8636.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8645/">CVE-2015-8645</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8646" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8646" ref_url="https://www.suse.com/security/cve/CVE-2015-8646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8646/">CVE-2015-8646</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8647" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8647" ref_url="https://www.suse.com/security/cve/CVE-2015-8647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8647/">CVE-2015-8647</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8648" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8648" ref_url="https://www.suse.com/security/cve/CVE-2015-8648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8648/">CVE-2015-8648</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8649" ref_url="https://www.suse.com/security/cve/CVE-2015-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8649/">CVE-2015-8649</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8650" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8650" ref_url="https://www.suse.com/security/cve/CVE-2015-8650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, and CVE-2015-8649.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8650/">CVE-2015-8650</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8651" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8651" ref_url="https://www.suse.com/security/cve/CVE-2015-8651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8651/">CVE-2015-8651</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8660" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8660" ref_url="https://www.suse.com/security/cve/CVE-2015-8660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html" source="SUSE-SU"/>
    <description>
    The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8660/">CVE-2015-8660</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960281">SUSE bug 960281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960329">SUSE bug 960329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
    <description>
    tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via the SamplesPerPixel tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
    <description>
    The putcontig8bitCIELab function in tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a packed TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00025.html" source="SUSE-SU"/>
    <description>
    apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962190">SUSE bug 962190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515706" comment="bind-libs-9.9.6P1-28.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515707" comment="bind-libs-32bit-9.9.6P1-28.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515708" comment="bind-utils-9.9.6P1-28.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516261" comment="bind-libs-9.9.6P1-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516262" comment="bind-libs-32bit-9.9.6P1-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516263" comment="bind-utils-9.9.6P1-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8705" ref_url="https://www.suse.com/security/cve/CVE-2015-8705" source="SUSE CVE"/>
    <description>
    buffer.c in named in ISC BIND 9.10.x before 9.10.3-P3, when debug logging is enabled, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit, or daemon crash) or possibly have unspecified other impact via (1) OPT data or (2) an ECS option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8705/">CVE-2015-8705</cve>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962190">SUSE bug 962190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8709" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.  NOTE: the vendor states "there is no kernel bug here."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<bugzilla href="https://bugzilla.suse.com/1010933">SUSE bug 1010933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959709">SUSE bug 959709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960561">SUSE bug 960561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960563">SUSE bug 960563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0188-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00066.html" source="SUSE-SU"/>
    <description>
    The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515702" comment="libxml2-2-2.9.1-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515703" comment="libxml2-2-32bit-2.9.1-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515704" comment="libxml2-tools-2.9.1-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515705" comment="python-libxml2-2.9.1-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8711" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8712" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8713" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8714" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8715" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8716" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8717" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8718" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8719" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8720" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8721" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8723" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8724" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8725" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8726" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8727" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8728" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8729" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8730" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8732" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960836">SUSE bug 960836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960708">SUSE bug 960708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8746" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8746" ref_url="https://www.suse.com/security/cve/CVE-2015-8746" source="SUSE CVE"/>
    <description>
    fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8746/">CVE-2015-8746</cve>
	<bugzilla href="https://bugzilla.suse.com/960839">SUSE bug 960839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8767" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515782" comment="glibc-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515783" comment="glibc-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515784" comment="glibc-devel-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515785" comment="glibc-devel-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515786" comment="glibc-i18ndata-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515787" comment="glibc-locale-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515788" comment="glibc-locale-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515789" comment="nscd-2.19-22.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516844" comment="glibc-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516845" comment="glibc-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516846" comment="glibc-devel-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516847" comment="glibc-devel-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516848" comment="glibc-i18ndata-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516849" comment="glibc-locale-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516850" comment="glibc-locale-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516851" comment="nscd-2.19-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
    <description>
    The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962735">SUSE bug 962735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515782" comment="glibc-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515783" comment="glibc-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515784" comment="glibc-devel-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515785" comment="glibc-devel-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515786" comment="glibc-i18ndata-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515787" comment="glibc-locale-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515788" comment="glibc-locale-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515789" comment="nscd-2.19-22.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516844" comment="glibc-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516845" comment="glibc-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516846" comment="glibc-devel-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516847" comment="glibc-devel-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516848" comment="glibc-i18ndata-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516849" comment="glibc-locale-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516850" comment="glibc-locale-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516851" comment="nscd-2.19-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515782" comment="glibc-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515783" comment="glibc-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515784" comment="glibc-devel-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515785" comment="glibc-devel-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515786" comment="glibc-i18ndata-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515787" comment="glibc-locale-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515788" comment="glibc-locale-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515789" comment="nscd-2.19-22.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516844" comment="glibc-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516845" comment="glibc-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516846" comment="glibc-devel-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516847" comment="glibc-devel-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516848" comment="glibc-i18ndata-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516849" comment="glibc-locale-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516850" comment="glibc-locale-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516851" comment="nscd-2.19-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965453">SUSE bug 965453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515782" comment="glibc-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515783" comment="glibc-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515784" comment="glibc-devel-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515785" comment="glibc-devel-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515786" comment="glibc-i18ndata-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515787" comment="glibc-locale-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515788" comment="glibc-locale-32bit-2.19-22.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515789" comment="nscd-2.19-22.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516844" comment="glibc-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516845" comment="glibc-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516846" comment="glibc-devel-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516847" comment="glibc-devel-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516848" comment="glibc-i18ndata-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516849" comment="glibc-locale-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516850" comment="glibc-locale-32bit-2.19-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516851" comment="nscd-2.19-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0475-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0477-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0486-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html" source="SUSE-SU"/>
    <description>
    The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<bugzilla href="https://bugzilla.suse.com/964845">SUSE bug 964845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156348" comment="libhogweed2-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156349" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156351" comment="libnettle4-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156352" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515778" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515779" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515780" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515781" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0475-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0477-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0486-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html" source="SUSE-SU"/>
    <description>
    x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<bugzilla href="https://bugzilla.suse.com/964847">SUSE bug 964847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156348" comment="libhogweed2-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156349" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156351" comment="libnettle4-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156352" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515778" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515779" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515780" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515781" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0475-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0477-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0486-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html" source="SUSE-SU"/>
    <description>
    The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<bugzilla href="https://bugzilla.suse.com/964849">SUSE bug 964849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156348" comment="libhogweed2-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156349" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156351" comment="libnettle4-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156352" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515778" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515779" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515780" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515781" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "&lt;!DOCTYPE html" substring in a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806</cve>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966683">SUSE bug 966683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979064">SUSE bug 979064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8817" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions &gt;= 1.6.0 and &lt;= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969125">SUSE bug 969125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969126">SUSE bug 969126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8818" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969125">SUSE bug 969125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969126">SUSE bug 969126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8830" ref_url="https://www.suse.com/security/cve/CVE-2015-8830" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.  NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8830/">CVE-2015-8830</cve>
	<bugzilla href="https://bugzilla.suse.com/969354">SUSE bug 969354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969355">SUSE bug 969355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8833" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00109.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833</cve>
	<bugzilla href="https://bugzilla.suse.com/970498">SUSE bug 970498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142148" comment="pidgin-otr-4.0.0-11.6 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159707" comment="pidgin-plugin-otr-4.0.2-1.29 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515911" comment="pidgin-otr-4.0.0-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8839" ref_url="https://www.suse.com/security/cve/CVE-2015-8839" source="SUSE CVE"/>
    <description>
    Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8839/">CVE-2015-8839</cve>
	<bugzilla href="https://bugzilla.suse.com/972174">SUSE bug 972174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8842" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8842" ref_url="https://www.suse.com/security/cve/CVE-2015-8842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html" source="SUSE-SU"/>
    <description>
    tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8842/">CVE-2015-8842</cve>
	<bugzilla href="https://bugzilla.suse.com/972612">SUSE bug 972612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516043" comment="libgudev-1_0-0-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516044" comment="libgudev-1_0-0-32bit-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516045" comment="libudev1-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516046" comment="libudev1-32bit-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516047" comment="systemd-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516048" comment="systemd-32bit-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516049" comment="systemd-bash-completion-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516050" comment="systemd-sysvinit-210-70.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516051" comment="udev-210-70.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517012" comment="libgudev-1_0-0-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517013" comment="libgudev-1_0-0-32bit-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517014" comment="libudev1-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517015" comment="libudev1-32bit-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517016" comment="systemd-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517017" comment="systemd-32bit-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517018" comment="systemd-bash-completion-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517019" comment="systemd-sysvinit-210-104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517020" comment="udev-210-104.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8844" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8844" ref_url="https://www.suse.com/security/cve/CVE-2015-8844" source="SUSE CVE"/>
    <description>
    The signal implementation in the Linux kernel before 4.3.5 on powerpc platforms does not check for an MSR with both the S and T bits set, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8844/">CVE-2015-8844</cve>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8845" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8845" ref_url="https://www.suse.com/security/cve/CVE-2015-8845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8845/">CVE-2015-8845</cve>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<bugzilla href="https://bugzilla.suse.com/976584">SUSE bug 976584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997948">SUSE bug 997948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997950">SUSE bug 997950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516357" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516358" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516359" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516360" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1322-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1630-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00077.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ExponentialFunction::ExponentialFunction function in Poppler before 0.40.0 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via an invalid blend mode in the ExtGState dictionary in a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516074" comment="libpoppler-glib8-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516075" comment="libpoppler-qt4-4-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516076" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516077" comment="poppler-tools-0.24.4-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8871" ref_url="https://www.suse.com/security/cve/CVE-2015-8871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the opj_j2k_write_mco function in j2k.c in OpenJPEG before 2.1.1 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-8871/">CVE-2015-8871</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979907">SUSE bug 979907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518016" comment="libopenjp2-7-2.1.0-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002225.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1461-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00014.html" source="SUSE-SU"/>
    <description>
    The set_fat function in fat.c in dosfstools before 4.0 might allow attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an "off-by-two error."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516341" comment="dosfstools-3.0.26-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8875" ref_url="https://www.suse.com/security/cve/CVE-2015-8875" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in the (1) pixops_composite_nearest, (2) pixops_composite_color_nearest, and (3) pixops_process functions in pixops/pixops.c in gdk-pixbuf before 2.33.1 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8875/">CVE-2015-8875</cve>
	<bugzilla href="https://bugzilla.suse.com/980497">SUSE bug 980497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333994" comment="gdk-pixbuf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8876" ref_url="https://www.suse.com/security/cve/CVE-2015-8876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00108.html" source="SUSE-SU"/>
    <description>
    Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8876/">CVE-2015-8876</cve>
	<bugzilla href="https://bugzilla.suse.com/1019550">SUSE bug 1019550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981049">SUSE bug 981049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8877" ref_url="https://www.suse.com/security/cve/CVE-2015-8877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00108.html" source="SUSE-SU"/>
    <description>
    The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8877/">CVE-2015-8877</cve>
	<bugzilla href="https://bugzilla.suse.com/981061">SUSE bug 981061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8878" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8878" ref_url="https://www.suse.com/security/cve/CVE-2015-8878" source="SUSE CVE"/>
    <description>
    main/php_open_temporary_file.c in PHP before 5.5.28 and 5.6.x before 5.6.12 does not ensure thread safety, which allows remote attackers to cause a denial of service (race condition and heap memory corruption) by leveraging an application that performs many temporary-file accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8878/">CVE-2015-8878</cve>
	<bugzilla href="https://bugzilla.suse.com/981055">SUSE bug 981055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8879" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00108.html" source="SUSE-SU"/>
    <description>
    The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879</cve>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8894" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8895" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and later allows remote attackers to cause a denial of service (application crash) via a crafted length value, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983527">SUSE bug 983527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8899" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00004.html" source="SUSE-SU"/>
    <description>
    Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158964" comment="dnsmasq-2.76-17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516773" comment="dnsmasq-2.71-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8900" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8900" ref_url="https://www.suse.com/security/cve/CVE-2015-8900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8900/">CVE-2015-8900</cve>
	<bugzilla href="https://bugzilla.suse.com/983232">SUSE bug 983232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8901" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted MIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8902" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadBlobByte function in coders/pdb.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8903" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted VICAR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8915" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
    <description>
    bsdcpio in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read and crash) via crafted cpio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915</cve>
	<bugzilla href="https://bugzilla.suse.com/985601">SUSE bug 985601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8916" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8916" ref_url="https://www.suse.com/security/cve/CVE-2015-8916" source="SUSE CVE"/>
    <description>
    bsdtar in libarchive before 3.2.0 returns a success code without filling the entry when the header is a "split file in multivolume RAR," which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted rar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8916/">CVE-2015-8916</cve>
	<bugzilla href="https://bugzilla.suse.com/985694">SUSE bug 985694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8918" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The archive_string_append function in archive_string.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted cab files, related to "overlapping memcpy."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8919" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The lha_read_file_extended_header function in archive_read_support_format_lha.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds heap) via a crafted (1) lzh or (2) lha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919</cve>
	<bugzilla href="https://bugzilla.suse.com/985697">SUSE bug 985697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8920" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The _ar_read_header function in archive_read_support_format_ar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds stack read) via a crafted ar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8921" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The ae_strtofflags function in archive_entry.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8922" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The read_CodersInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted 7z file, related to the _7z_folder struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922</cve>
	<bugzilla href="https://bugzilla.suse.com/985685">SUSE bug 985685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8923" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The process_extra function in libarchive before 3.2.0 uses the size field and a signed number in an offset, which allows remote attackers to cause a denial of service (crash) via a crafted zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923</cve>
	<bugzilla href="https://bugzilla.suse.com/985703">SUSE bug 985703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8924" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The archive_read_format_tar_read_header function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8925" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The readline function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read) via a crafted mtree file, related to newline parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<bugzilla href="https://bugzilla.suse.com/985706">SUSE bug 985706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8926" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The archive_read_format_rar_read_data function in archive_read_support_format_rar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted rar archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926</cve>
	<bugzilla href="https://bugzilla.suse.com/985704">SUSE bug 985704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8927" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8927" ref_url="https://www.suse.com/security/cve/CVE-2015-8927" source="SUSE CVE"/>
    <description>
    The trad_enc_decrypt_update function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted zip file, related to reading the password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8927/">CVE-2015-8927</cve>
	<bugzilla href="https://bugzilla.suse.com/985712">SUSE bug 985712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334081" comment="libarchive is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8928" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The process_add_entry function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<bugzilla href="https://bugzilla.suse.com/985679">SUSE bug 985679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8929" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Memory leak in the __archive_read_get_extract function in archive_read_extract2.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service via a tar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8930" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    bsdtar in libarchive before 3.2.0 allows remote attackers to cause a denial of service (infinite loop) via an ISO with a directory that is a member of itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930</cve>
	<bugzilla href="https://bugzilla.suse.com/985700">SUSE bug 985700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8931" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) get_time_t_max and (2) get_time_t_min functions in archive_read_support_format_mtree.c in libarchive before 3.2.0 allow remote attackers to have unspecified impact via a crafted mtree file, which triggers undefined behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931</cve>
	<bugzilla href="https://bugzilla.suse.com/985689">SUSE bug 985689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8932" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The compress_bidder_init function in archive_read_support_filter_compress.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file, which triggers an invalid left shift.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932</cve>
	<bugzilla href="https://bugzilla.suse.com/985665">SUSE bug 985665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8933" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<bugzilla href="https://bugzilla.suse.com/985688">SUSE bug 985688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8934" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The copy_from_lzss_window function in archive_read_support_format_rar.c in libarchive 3.2.0 and earlier allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted rar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<bugzilla href="https://bugzilla.suse.com/985673">SUSE bug 985673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8946" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8946" ref_url="https://www.suse.com/security/cve/CVE-2015-8946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00006.html" source="SUSE-SU"/>
    <description>
    ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8946/">CVE-2015-8946</cve>
	<bugzilla href="https://bugzilla.suse.com/989121">SUSE bug 989121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989122">SUSE bug 989122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334267" comment="ecryptfs-utils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518823" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518824" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8947" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8947" ref_url="https://www.suse.com/security/cve/CVE-2015-8947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003174.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2082-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00065.html" source="SUSE-SU"/>
    <description>
    hb-ot-layout-gpos-table.hh in HarfBuzz before 1.0.5 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted data, a different vulnerability than CVE-2016-2052.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8947/">CVE-2015-8947</cve>
	<bugzilla href="https://bugzilla.suse.com/963436">SUSE bug 963436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989564">SUSE bug 989564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517712" comment="libixion-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517713" comment="libmwaw-0_3-3-0.3.11-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517714" comment="liborcus-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517715" comment="libreoffice-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517716" comment="libreoffice-base-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517717" comment="libreoffice-base-drivers-mysql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517718" comment="libreoffice-base-drivers-postgresql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517719" comment="libreoffice-calc-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517720" comment="libreoffice-calc-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517721" comment="libreoffice-draw-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517722" comment="libreoffice-filters-optional-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517723" comment="libreoffice-gnome-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517724" comment="libreoffice-icon-theme-galaxy-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517725" comment="libreoffice-icon-theme-tango-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517726" comment="libreoffice-impress-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517727" comment="libreoffice-l10n-af-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517728" comment="libreoffice-l10n-ar-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517729" comment="libreoffice-l10n-ca-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517730" comment="libreoffice-l10n-cs-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517731" comment="libreoffice-l10n-da-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517732" comment="libreoffice-l10n-de-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517733" comment="libreoffice-l10n-en-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517734" comment="libreoffice-l10n-es-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517735" comment="libreoffice-l10n-fi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517736" comment="libreoffice-l10n-fr-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517737" comment="libreoffice-l10n-gu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517738" comment="libreoffice-l10n-hi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517739" comment="libreoffice-l10n-hu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517740" comment="libreoffice-l10n-it-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517741" comment="libreoffice-l10n-ja-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517742" comment="libreoffice-l10n-ko-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517743" comment="libreoffice-l10n-nb-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517744" comment="libreoffice-l10n-nl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517745" comment="libreoffice-l10n-nn-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517746" comment="libreoffice-l10n-pl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517747" comment="libreoffice-l10n-pt_BR-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517748" comment="libreoffice-l10n-pt_PT-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517749" comment="libreoffice-l10n-ro-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517750" comment="libreoffice-l10n-ru-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517751" comment="libreoffice-l10n-sk-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517752" comment="libreoffice-l10n-sv-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517753" comment="libreoffice-l10n-xh-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517754" comment="libreoffice-l10n-zh_CN-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517755" comment="libreoffice-l10n-zh_TW-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517756" comment="libreoffice-l10n-zu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517757" comment="libreoffice-mailmerge-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517758" comment="libreoffice-math-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517759" comment="libreoffice-officebean-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517760" comment="libreoffice-pyuno-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517761" comment="libreoffice-writer-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517762" comment="libreoffice-writer-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517763" comment="libreofficekit-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517764" comment="libstaroffice-0_0-0-0.0.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517765" comment="libzmf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517766" comment="myspell-af_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517767" comment="myspell-af_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517768" comment="myspell-ar-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517769" comment="myspell-ar_AE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517770" comment="myspell-ar_BH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517771" comment="myspell-ar_DZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517772" comment="myspell-ar_EG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517773" comment="myspell-ar_IQ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517774" comment="myspell-ar_JO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517775" comment="myspell-ar_KW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517776" comment="myspell-ar_LB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517777" comment="myspell-ar_LY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517778" comment="myspell-ar_MA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517779" comment="myspell-ar_OM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517780" comment="myspell-ar_QA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517781" comment="myspell-ar_SA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517782" comment="myspell-ar_SD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517783" comment="myspell-ar_SY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517784" comment="myspell-ar_TN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517785" comment="myspell-ar_YE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517786" comment="myspell-be_BY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517787" comment="myspell-bg_BG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517788" comment="myspell-bn_BD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517789" comment="myspell-bn_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517790" comment="myspell-bs-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517791" comment="myspell-bs_BA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517792" comment="myspell-ca-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517793" comment="myspell-ca_AD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517794" comment="myspell-ca_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517795" comment="myspell-ca_ES_valencia-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517796" comment="myspell-ca_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517797" comment="myspell-ca_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517798" comment="myspell-cs_CZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517799" comment="myspell-da_DK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517800" comment="myspell-de-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517801" comment="myspell-de_AT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517802" comment="myspell-de_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517803" comment="myspell-de_DE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517804" comment="myspell-dictionaries-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517805" comment="myspell-el_GR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517806" comment="myspell-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517807" comment="myspell-en_AU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517808" comment="myspell-en_BS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517809" comment="myspell-en_BZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517810" comment="myspell-en_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517811" comment="myspell-en_GB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517812" comment="myspell-en_GH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517813" comment="myspell-en_IE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517814" comment="myspell-en_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517815" comment="myspell-en_JM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517816" comment="myspell-en_MW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517817" comment="myspell-en_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517818" comment="myspell-en_NZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517819" comment="myspell-en_PH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517820" comment="myspell-en_TT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517821" comment="myspell-en_US-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517822" comment="myspell-en_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517823" comment="myspell-en_ZW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517824" comment="myspell-es-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517825" comment="myspell-es_AR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517826" comment="myspell-es_BO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517827" comment="myspell-es_CL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517828" comment="myspell-es_CO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517829" comment="myspell-es_CR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517830" comment="myspell-es_CU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517831" comment="myspell-es_DO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517832" comment="myspell-es_EC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517833" comment="myspell-es_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517834" comment="myspell-es_GT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517835" comment="myspell-es_HN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517836" comment="myspell-es_MX-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517837" comment="myspell-es_NI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517838" comment="myspell-es_PA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517839" comment="myspell-es_PE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517840" comment="myspell-es_PR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517841" comment="myspell-es_PY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517842" comment="myspell-es_SV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517843" comment="myspell-es_UY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517844" comment="myspell-es_VE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517845" comment="myspell-et_EE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517846" comment="myspell-fr_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517847" comment="myspell-fr_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517848" comment="myspell-fr_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517849" comment="myspell-fr_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517850" comment="myspell-fr_LU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517851" comment="myspell-fr_MC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517852" comment="myspell-gu_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517853" comment="myspell-he_IL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517854" comment="myspell-hi_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517855" comment="myspell-hr_HR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517856" comment="myspell-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517857" comment="myspell-it_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517858" comment="myspell-lightproof-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517859" comment="myspell-lightproof-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517860" comment="myspell-lightproof-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517861" comment="myspell-lightproof-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517862" comment="myspell-lo_LA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517863" comment="myspell-lt_LT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517864" comment="myspell-lv_LV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517865" comment="myspell-nb_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517866" comment="myspell-nl_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517867" comment="myspell-nl_NL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517868" comment="myspell-nn_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517869" comment="myspell-no-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517870" comment="myspell-pl_PL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517871" comment="myspell-pt_AO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517872" comment="myspell-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517873" comment="myspell-pt_PT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517874" comment="myspell-ro-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517875" comment="myspell-ro_RO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517876" comment="myspell-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517877" comment="myspell-sk_SK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517878" comment="myspell-sl_SI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517879" comment="myspell-sr-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517880" comment="myspell-sr_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517881" comment="myspell-sr_Latn_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517882" comment="myspell-sr_Latn_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517883" comment="myspell-sr_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517884" comment="myspell-sv_FI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517885" comment="myspell-sv_SE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517886" comment="myspell-te-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517887" comment="myspell-te_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517888" comment="myspell-th_TH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517889" comment="myspell-uk_UA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517890" comment="myspell-vi-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517891" comment="myspell-vi_VN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517892" comment="myspell-zu_ZA-20170511-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519257" comment="libixion-0_12-0-0.12.1-13.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519258" comment="libmwaw-0_3-3-0.3.11-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519259" comment="liborcus-0_12-0-0.12.1-10.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519260" comment="libreoffice-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519261" comment="libreoffice-base-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519262" comment="libreoffice-base-drivers-mysql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519263" comment="libreoffice-base-drivers-postgresql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519264" comment="libreoffice-calc-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519265" comment="libreoffice-calc-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519266" comment="libreoffice-draw-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519267" comment="libreoffice-filters-optional-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519268" comment="libreoffice-gnome-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519269" comment="libreoffice-icon-theme-galaxy-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519270" comment="libreoffice-icon-theme-tango-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519271" comment="libreoffice-impress-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519272" comment="libreoffice-l10n-af-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519273" comment="libreoffice-l10n-ar-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519274" comment="libreoffice-l10n-ca-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519275" comment="libreoffice-l10n-cs-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519276" comment="libreoffice-l10n-da-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519277" comment="libreoffice-l10n-de-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519278" comment="libreoffice-l10n-en-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519279" comment="libreoffice-l10n-es-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519280" comment="libreoffice-l10n-fi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519281" comment="libreoffice-l10n-fr-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519282" comment="libreoffice-l10n-gu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519283" comment="libreoffice-l10n-hi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519284" comment="libreoffice-l10n-hu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519285" comment="libreoffice-l10n-it-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519286" comment="libreoffice-l10n-ja-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519287" comment="libreoffice-l10n-ko-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519288" comment="libreoffice-l10n-nb-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519289" comment="libreoffice-l10n-nl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519290" comment="libreoffice-l10n-nn-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519291" comment="libreoffice-l10n-pl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519292" comment="libreoffice-l10n-pt_BR-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519293" comment="libreoffice-l10n-pt_PT-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519294" comment="libreoffice-l10n-ro-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519295" comment="libreoffice-l10n-ru-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519296" comment="libreoffice-l10n-sk-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519297" comment="libreoffice-l10n-sv-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519298" comment="libreoffice-l10n-xh-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519299" comment="libreoffice-l10n-zh_CN-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519300" comment="libreoffice-l10n-zh_TW-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519301" comment="libreoffice-l10n-zu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519302" comment="libreoffice-mailmerge-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519303" comment="libreoffice-math-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519304" comment="libreoffice-officebean-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519305" comment="libreoffice-pyuno-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519306" comment="libreoffice-writer-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519307" comment="libreoffice-writer-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519308" comment="libreofficekit-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519309" comment="libstaroffice-0_0-0-0.0.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519310" comment="libzmf-0_0-0-0.0.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519311" comment="myspell-af_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519312" comment="myspell-af_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519313" comment="myspell-ar-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519314" comment="myspell-ar_AE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519315" comment="myspell-ar_BH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519316" comment="myspell-ar_DZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519317" comment="myspell-ar_EG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519318" comment="myspell-ar_IQ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519319" comment="myspell-ar_JO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519320" comment="myspell-ar_KW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519321" comment="myspell-ar_LB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519322" comment="myspell-ar_LY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519323" comment="myspell-ar_MA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519324" comment="myspell-ar_OM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519325" comment="myspell-ar_QA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519326" comment="myspell-ar_SA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519327" comment="myspell-ar_SD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519328" comment="myspell-ar_SY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519329" comment="myspell-ar_TN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519330" comment="myspell-ar_YE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519331" comment="myspell-be_BY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519332" comment="myspell-bg_BG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519333" comment="myspell-bn_BD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519334" comment="myspell-bn_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519335" comment="myspell-bs-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519336" comment="myspell-bs_BA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519337" comment="myspell-ca-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519338" comment="myspell-ca_AD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519339" comment="myspell-ca_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519340" comment="myspell-ca_ES_valencia-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519341" comment="myspell-ca_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519342" comment="myspell-ca_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519343" comment="myspell-cs_CZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519344" comment="myspell-da_DK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519345" comment="myspell-de-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519346" comment="myspell-de_AT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519347" comment="myspell-de_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519348" comment="myspell-de_DE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519349" comment="myspell-dictionaries-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519350" comment="myspell-el_GR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519351" comment="myspell-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519352" comment="myspell-en_AU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519353" comment="myspell-en_BS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519354" comment="myspell-en_BZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519355" comment="myspell-en_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519356" comment="myspell-en_GB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519357" comment="myspell-en_GH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519358" comment="myspell-en_IE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519359" comment="myspell-en_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519360" comment="myspell-en_JM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519361" comment="myspell-en_MW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519362" comment="myspell-en_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519363" comment="myspell-en_NZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519364" comment="myspell-en_PH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519365" comment="myspell-en_TT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519366" comment="myspell-en_US-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519367" comment="myspell-en_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519368" comment="myspell-en_ZW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519369" comment="myspell-es-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519370" comment="myspell-es_AR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519371" comment="myspell-es_BO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519372" comment="myspell-es_CL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519373" comment="myspell-es_CO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519374" comment="myspell-es_CR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519375" comment="myspell-es_CU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519376" comment="myspell-es_DO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519377" comment="myspell-es_EC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519378" comment="myspell-es_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519379" comment="myspell-es_GT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519380" comment="myspell-es_HN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519381" comment="myspell-es_MX-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519382" comment="myspell-es_NI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519383" comment="myspell-es_PA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519384" comment="myspell-es_PE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519385" comment="myspell-es_PR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519386" comment="myspell-es_PY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519387" comment="myspell-es_SV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519388" comment="myspell-es_UY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519389" comment="myspell-es_VE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519390" comment="myspell-et_EE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519391" comment="myspell-fr_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519392" comment="myspell-fr_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519393" comment="myspell-fr_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519394" comment="myspell-fr_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519395" comment="myspell-fr_LU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519396" comment="myspell-fr_MC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519397" comment="myspell-gu_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519398" comment="myspell-he_IL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519399" comment="myspell-hi_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519400" comment="myspell-hr_HR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519401" comment="myspell-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519402" comment="myspell-it_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519403" comment="myspell-lightproof-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519404" comment="myspell-lightproof-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519405" comment="myspell-lightproof-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519406" comment="myspell-lightproof-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519407" comment="myspell-lo_LA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519408" comment="myspell-lt_LT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519409" comment="myspell-lv_LV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519410" comment="myspell-nb_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519411" comment="myspell-nl_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519412" comment="myspell-nl_NL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519413" comment="myspell-nn_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519414" comment="myspell-no-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519415" comment="myspell-pl_PL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519416" comment="myspell-pt_AO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519417" comment="myspell-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519418" comment="myspell-pt_PT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519419" comment="myspell-ro-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519420" comment="myspell-ro_RO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519421" comment="myspell-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519422" comment="myspell-sk_SK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519423" comment="myspell-sl_SI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519424" comment="myspell-sr-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519425" comment="myspell-sr_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519426" comment="myspell-sr_Latn_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519427" comment="myspell-sr_Latn_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519428" comment="myspell-sr_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519429" comment="myspell-sv_FI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519430" comment="myspell-sv_SE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519431" comment="myspell-te-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519432" comment="myspell-te_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519433" comment="myspell-th_TH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519434" comment="myspell-uk_UA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519435" comment="myspell-vi-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519436" comment="myspell-vi_VN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519437" comment="myspell-zu_ZA-20170511-16.2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
    <description>
    idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<bugzilla href="https://bugzilla.suse.com/1014473">SUSE bug 1014473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190777">SUSE bug 1190777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174162" comment="libidn11-1.28-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174163" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516300" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516301" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8950" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8950" ref_url="https://www.suse.com/security/cve/CVE-2015-8950" source="SUSE CVE"/>
    <description>
    arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8950/">CVE-2015-8950</cve>
	<bugzilla href="https://bugzilla.suse.com/1003931">SUSE bug 1003931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004045">SUSE bug 1004045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8952" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8952" ref_url="https://www.suse.com/security/cve/CVE-2015-8952" source="SUSE CVE"/>
    <description>
    The mbcache feature in the ext2 and ext4 filesystem implementations in the Linux kernel before 4.6 mishandles xattr block caching, which allows local users to cause a denial of service (soft lockup) via filesystem operations in environments that use many attributes, as demonstrated by Ceph and Samba.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8952/">CVE-2015-8952</cve>
	<bugzilla href="https://bugzilla.suse.com/995759">SUSE bug 995759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8953" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8953" ref_url="https://www.suse.com/security/cve/CVE-2015-8953" source="SUSE CVE"/>
    <description>
    fs/overlayfs/copy_up.c in the Linux kernel before 4.2.6 uses an incorrect cleanup code path, which allows local users to cause a denial of service (dentry reference leak) via filesystem operations on a large file in a lower overlayfs layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8953/">CVE-2015-8953</cve>
	<bugzilla href="https://bugzilla.suse.com/995763">SUSE bug 995763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8955" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8955" ref_url="https://www.suse.com/security/cve/CVE-2015-8955" source="SUSE CVE"/>
    <description>
    arch/arm64/kernel/perf_event.c in the Linux kernel before 4.1 on arm64 platforms allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via vectors involving events that are mishandled during a span of multiple HW PMUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8955/">CVE-2015-8955</cve>
	<bugzilla href="https://bugzilla.suse.com/1003931">SUSE bug 1003931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956</cve>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8957" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8958" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028079">SUSE bug 1028079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8959" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959</cve>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8960" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8960" ref_url="https://www.suse.com/security/cve/CVE-2015-8960" source="SUSE CVE"/>
    <description>
    The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8960/">CVE-2015-8960</cve>
	<bugzilla href="https://bugzilla.suse.com/941124">SUSE bug 941124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8961" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8961" ref_url="https://www.suse.com/security/cve/CVE-2015-8961" source="SUSE CVE"/>
    <description>
    The __ext4_journal_stop function in fs/ext4/ext4_jbd2.c in the Linux kernel before 4.3.3 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging improper access to a certain error field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8961/">CVE-2015-8961</cve>
	<bugzilla href="https://bugzilla.suse.com/1010492">SUSE bug 1010492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8962" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8963" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8963" ref_url="https://www.suse.com/security/cve/CVE-2015-8963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8963/">CVE-2015-8963</cve>
	<bugzilla href="https://bugzilla.suse.com/1010502">SUSE bug 1010502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8966" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8966" ref_url="https://www.suse.com/security/cve/CVE-2015-8966" source="SUSE CVE"/>
    <description>
    arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 4.4 allows local users to gain privileges via a crafted (1) F_OFD_GETLK, (2) F_OFD_SETLK, or (3) F_OFD_SETLKW command in an fcntl64 system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8966/">CVE-2015-8966</cve>
	<bugzilla href="https://bugzilla.suse.com/1014754">SUSE bug 1014754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8967" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8967" ref_url="https://www.suse.com/security/cve/CVE-2015-8967" source="SUSE CVE"/>
    <description>
    arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8967/">CVE-2015-8967</cve>
	<bugzilla href="https://bugzilla.suse.com/1014749">SUSE bug 1014749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8970" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
    <description>
    crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970</cve>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9016" ref_url="https://www.suse.com/security/cve/CVE-2015-9016" source="SUSE CVE"/>
    <description>
    In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead to local escalation of privilege. Product: Android. Versions: Android kernel. Android ID: A-63083046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9016/">CVE-2015-9016</cve>
	<bugzilla href="https://bugzilla.suse.com/1081683">SUSE bug 1081683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155536" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155537" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155538" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517365" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517366" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517367" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9230" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9230" ref_url="https://www.suse.com/security/cve/CVE-2015-9230" source="SUSE CVE"/>
    <description>
    In the admin/db-backup-security/db-backup-security.php page in the BulletProof Security plugin before .52.5 for WordPress, XSS is possible for remote authenticated administrators via the DBTablePrefix parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9230/">CVE-2015-9230</cve>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9251" ref_url="https://www.suse.com/security/cve/CVE-2015-9251" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-15"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-9251/">CVE-2015-9251</cve>
	<bugzilla href="https://bugzilla.suse.com/1099458">SUSE bug 1099458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100133">SUSE bug 1100133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111660">SUSE bug 1111660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9262" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00072.html" source="SUSE-SU"/>
    <description>
    _XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows remote attackers to cause denial of service or potentially code execution via a one-byte heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262</cve>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123801">SUSE bug 1123801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512236" comment="libXcursor1-1.1.14-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512237" comment="libXcursor1-32bit-1.1.14-4.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520076" comment="libXcursor1-1.1.14-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520077" comment="libXcursor1-32bit-1.1.14-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333972" comment="xorg-x11-libs is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9265" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9265" ref_url="https://www.suse.com/security/cve/CVE-2015-9265" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2018-14622.  Reason: This candidate is a reservation duplicate of CVE-2018-14622.  Notes: All CVE users should reference CVE-2018-14622 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-05-06"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9265/">CVE-2015-9265</cve>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009353593" comment="libtirpc1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9274" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9274" ref_url="https://www.suse.com/security/cve/CVE-2015-9274" source="SUSE CVE"/>
    <description>
    HarfBuzz before 1.0.4 allows remote attackers to cause a denial of service (invalid read of two bytes and application crash) because of GPOS and GSUB table mishandling, related to hb-ot-layout-gpos-table.hh, hb-ot-layout-gsub-table.hh, and hb-ot-layout-gsubgpos-private.hh.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-9274/">CVE-2015-9274</cve>
	<bugzilla href="https://bugzilla.suse.com/1116297">SUSE bug 1116297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338891" comment="harfbuzz is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9289" ref_url="https://www.suse.com/security/cve/CVE-2015-9289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-9289/">CVE-2015-9289</cve>
	<bugzilla href="https://bugzilla.suse.com/1143179">SUSE bug 1143179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9381" ref_url="https://www.suse.com/security/cve/CVE-2015-9381" source="SUSE CVE"/>
    <description>
    FreeType before 2.6.1 has a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9381/">CVE-2015-9381</cve>
	<bugzilla href="https://bugzilla.suse.com/1149384">SUSE bug 1149384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334204" comment="freetype is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0617" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0617" ref_url="https://www.suse.com/security/cve/CVE-2016-0617" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the kernel-uek component in Oracle Linux 6 allows local users to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0617/">CVE-2016-0617</cve>
	<bugzilla href="https://bugzilla.suse.com/965794">SUSE bug 965794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2715-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2961-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00100.html" source="SUSE-SU"/>
    <description>
    The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188388">SUSE bug 1188388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516642" comment="bash-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516643" comment="bash-doc-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516644" comment="bash-lang-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516645" comment="libreadline6-6.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516646" comment="libreadline6-32bit-6.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516647" comment="readline-doc-6.2-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520998" comment="bash-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521000" comment="bash-lang-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521001" comment="libreadline6-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521002" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0959-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515912" comment="java-1_7_0-openjdk-1.7.0.99-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515913" comment="java-1_7_0-openjdk-headless-1.7.0.99-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516941" comment="java-1_8_0-openjdk-1.8.0.77-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516942" comment="java-1_8_0-openjdk-headless-1.8.0.77-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515912" comment="java-1_7_0-openjdk-1.7.0.99-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515913" comment="java-1_7_0-openjdk-headless-1.7.0.99-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0651" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517008" comment="java-1_8_0-openjdk-1.8.0.91-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517009" comment="java-1_8_0-openjdk-headless-1.8.0.91-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517008" comment="java-1_8_0-openjdk-1.8.0.91-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517009" comment="java-1_8_0-openjdk-headless-1.8.0.91-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality via vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517008" comment="java-1_8_0-openjdk-1.8.0.91-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517009" comment="java-1_8_0-openjdk-headless-1.8.0.91-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0701" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701" source="SUSE CVE"/>
		<reference ref_id="TID7022627" ref_url="https://www.suse.com/support/kb/doc/?id=7022627" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
    <description>
    The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195379">SUSE bug 1195379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963413">SUSE bug 963413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00027.html" source="SUSE-SU"/>
    <description>
    The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<bugzilla href="https://bugzilla.suse.com/1007806">SUSE bug 1007806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0704" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
    <description>
    An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516066" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516067" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516068" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0747-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0756-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="TID7017169" ref_url="https://www.suse.com/support/kb/doc?id=7017169" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962075">SUSE bug 962075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962078">SUSE bug 962078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515711" comment="kernel-default-3.12.51-52.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515712" comment="kernel-default-devel-3.12.51-52.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515713" comment="kernel-default-extra-3.12.51-52.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515714" comment="kernel-devel-3.12.51-52.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515715" comment="kernel-macros-3.12.51-52.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515716" comment="kernel-source-3.12.51-52.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515717" comment="kernel-syms-3.12.51-52.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515718" comment="kernel-xen-3.12.51-52.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515719" comment="kernel-xen-devel-3.12.51-52.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516307" comment="kernel-default-3.12.51-60.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516308" comment="kernel-default-devel-3.12.51-60.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516309" comment="kernel-default-extra-3.12.51-60.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516310" comment="kernel-devel-3.12.51-60.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516311" comment="kernel-macros-3.12.51-60.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516312" comment="kernel-source-3.12.51-60.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516313" comment="kernel-syms-3.12.51-60.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516314" comment="kernel-xen-3.12.51-60.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516315" comment="kernel-xen-devel-3.12.51-60.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0729" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002000.html" source="SUSE-SU"/>
		<reference ref_id="TID7017306" ref_url="https://www.suse.com/support/kb/doc/?id=7017306" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1808-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C before 3.1.3 allow remote attackers to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<bugzilla href="https://bugzilla.suse.com/966822">SUSE bug 966822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515998" comment="libxerces-c-3_1-3.1.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515999" comment="libxerces-c-3_1-32bit-3.1.1-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0880-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html" source="SUSE-SU"/>
    <description>
    libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<bugzilla href="https://bugzilla.suse.com/965875">SUSE bug 965875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515802" comment="libssh4-0.6.3-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1725-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html" source="SUSE-SU"/>
    <description>
    The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516087" comment="libspice-server1-0.12.4-8.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517022" comment="libspice-server1-0.12.5-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0360-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0373-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html" source="SUSE-SU"/>
    <description>
    The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515769" comment="curl-7.37.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515770" comment="libcurl4-7.37.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515771" comment="libcurl4-32bit-7.37.0-18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980856">SUSE bug 980856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0764" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764" source="SUSE CVE"/>
    <description>
    Race condition in Network Manager before 1.0.12 as packaged in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows local users to obtain sensitive connection information by reading temporary files during ifcfg and keyfile changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<bugzilla href="https://bugzilla.suse.com/974072">SUSE bug 974072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142074" comment="NetworkManager-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142075" comment="NetworkManager-lang-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140431" comment="libnm-glib-vpn1-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140432" comment="libnm-glib4-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140433" comment="libnm-util2-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140434" comment="libnm0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142076" comment="typelib-1_0-NM-1_0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140435" comment="typelib-1_0-NMClient-1_0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140436" comment="typelib-1_0-NetworkManager-1_0-1.0.12-8.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159624" comment="NetworkManager-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159625" comment="NetworkManager-lang-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159169" comment="libnm-glib-vpn1-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159170" comment="libnm-glib4-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159171" comment="libnm-util2-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159172" comment="libnm0-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159626" comment="typelib-1_0-NM-1_0-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159173" comment="typelib-1_0-NMClient-1_0-1.0.12-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159174" comment="typelib-1_0-NetworkManager-1_0-1.0.12-12.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512013" comment="NetworkManager-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512014" comment="NetworkManager-lang-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512015" comment="libnm-glib-vpn1-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512016" comment="libnm-glib4-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512017" comment="libnm-util2-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512018" comment="libnm0-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512019" comment="typelib-1_0-NM-1_0-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512020" comment="typelib-1_0-NMClient-1_0-1.0.12-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512021" comment="typelib-1_0-NetworkManager-1_0-1.0.12-13.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515793" comment="libecpg6-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515794" comment="libpq5-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515795" comment="libpq5-32bit-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515790" comment="postgresql93-9.3.11-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515796" comment="postgresql94-9.4.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334083" comment="postgresql is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515793" comment="libecpg6-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515794" comment="libpq5-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515795" comment="libpq5-32bit-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515796" comment="postgresql94-9.4.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334083" comment="postgresql is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" source="SUSE-SU"/>
    <description>
    The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<bugzilla href="https://bugzilla.suse.com/968223">SUSE bug 968223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517500" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517501" comment="python3-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517502" comment="python3-base-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517503" comment="python3-curses-3.4.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159263" comment="python-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159265" comment="python-curses-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159269" comment="python-tk-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159274" comment="python3-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159275" comment="python3-curses-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512601" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512602" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516316" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516317" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516599" comment="libpython3_4m1_0-3.4.5-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516318" comment="python-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516319" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516320" comment="python-curses-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516321" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516322" comment="python-tk-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516323" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516600" comment="python3-3.4.5-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516601" comment="python3-base-3.4.5-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983246">SUSE bug 983246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986409">SUSE bug 986409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515793" comment="libecpg6-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515794" comment="libpq5-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515795" comment="libpq5-32bit-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515790" comment="postgresql93-9.3.11-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515796" comment="postgresql94-9.4.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334083" comment="postgresql is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515793" comment="libecpg6-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515794" comment="libpq5-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515795" comment="libpq5-32bit-9.4.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515796" comment="postgresql94-9.4.6-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334083" comment="postgresql is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0774" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0774" ref_url="https://www.suse.com/security/cve/CVE-2016-0774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
    <description>
    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0774/">CVE-2016-0774</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964732">SUSE bug 964732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="TID7017180" ref_url="https://www.suse.com/support/kb/doc/?id=7017180" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516055" comment="openssh-6.6p1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516056" comment="openssh-askpass-gnome-6.6p1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516057" comment="openssh-helpers-6.6p1-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516055" comment="openssh-6.6p1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516056" comment="openssh-askpass-gnome-6.6p1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516057" comment="openssh-helpers-6.6p1-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<bugzilla href="https://bugzilla.suse.com/1149968">SUSE bug 1149968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968174">SUSE bug 968174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974691">SUSE bug 974691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515814" comment="libssh2-1-1.4.3-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515815" comment="libssh2-1-32bit-1.4.3-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002146.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1415-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00050.html" source="SUSE-SU"/>
    <description>
    The lwp filter in LibreOffice before 5.0.4 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted LotusWordPro (lwp) document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<bugzilla href="https://bugzilla.suse.com/967014">SUSE bug 967014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967015">SUSE bug 967015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515487" comment="boost-license1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515488" comment="hunspell-1.3.2-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515489" comment="hunspell-32bit-1.3.2-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515490" comment="hunspell-tools-1.3.2-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515491" comment="libOpenCOLLADA0-1_3335ac1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515492" comment="libboost_atomic1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515493" comment="libboost_date_time1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515494" comment="libboost_filesystem1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515495" comment="libboost_iostreams1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515496" comment="libboost_program_options1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515497" comment="libboost_regex1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515498" comment="libboost_signals1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515499" comment="libboost_system1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515500" comment="libboost_thread1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515501" comment="libcmis-0_5-5-0.5.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515502" comment="libetonyek-0_1-1-0.1.6-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515503" comment="libhyphen0-2.8.8-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515504" comment="libixion-0_11-0-0.11.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515505" comment="liborcus-0_11-0-0.11.0-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515506" comment="libreoffice-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515507" comment="libreoffice-base-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515508" comment="libreoffice-base-drivers-mysql-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515509" comment="libreoffice-base-drivers-postgresql-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515510" comment="libreoffice-calc-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515511" comment="libreoffice-calc-extensions-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515512" comment="libreoffice-draw-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515513" comment="libreoffice-filters-optional-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515514" comment="libreoffice-gnome-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515515" comment="libreoffice-icon-theme-galaxy-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515516" comment="libreoffice-icon-theme-tango-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515517" comment="libreoffice-impress-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515518" comment="libreoffice-l10n-af-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515519" comment="libreoffice-l10n-ar-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515520" comment="libreoffice-l10n-ca-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515521" comment="libreoffice-l10n-cs-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515522" comment="libreoffice-l10n-da-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515523" comment="libreoffice-l10n-de-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515524" comment="libreoffice-l10n-en-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515525" comment="libreoffice-l10n-es-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515526" comment="libreoffice-l10n-fi-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515527" comment="libreoffice-l10n-fr-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515528" comment="libreoffice-l10n-gu-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515529" comment="libreoffice-l10n-hi-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515530" comment="libreoffice-l10n-hu-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515531" comment="libreoffice-l10n-it-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515532" comment="libreoffice-l10n-ja-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515533" comment="libreoffice-l10n-ko-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515534" comment="libreoffice-l10n-nb-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515535" comment="libreoffice-l10n-nl-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515536" comment="libreoffice-l10n-nn-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515537" comment="libreoffice-l10n-pl-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515538" comment="libreoffice-l10n-pt-BR-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515539" comment="libreoffice-l10n-pt-PT-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515540" comment="libreoffice-l10n-ru-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515541" comment="libreoffice-l10n-sk-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515542" comment="libreoffice-l10n-sv-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515543" comment="libreoffice-l10n-xh-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515544" comment="libreoffice-l10n-zh-Hans-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515545" comment="libreoffice-l10n-zh-Hant-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515546" comment="libreoffice-l10n-zu-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515547" comment="libreoffice-mailmerge-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515548" comment="libreoffice-math-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515549" comment="libreoffice-officebean-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515550" comment="libreoffice-pyuno-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515551" comment="libreoffice-writer-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515552" comment="libreoffice-writer-extensions-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515553" comment="libvisio-0_1-1-0.1.5-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515554" comment="libwps-0_4-4-0.4.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515555" comment="myspell-af_NA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515556" comment="myspell-af_ZA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515557" comment="myspell-ar-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515558" comment="myspell-ar_AE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515559" comment="myspell-ar_BH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515560" comment="myspell-ar_DZ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515561" comment="myspell-ar_EG-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515562" comment="myspell-ar_IQ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515563" comment="myspell-ar_JO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515564" comment="myspell-ar_KW-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515565" comment="myspell-ar_LB-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515566" comment="myspell-ar_LY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515567" comment="myspell-ar_MA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515568" comment="myspell-ar_OM-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515569" comment="myspell-ar_QA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515570" comment="myspell-ar_SA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515571" comment="myspell-ar_SD-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515572" comment="myspell-ar_SY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515573" comment="myspell-ar_TN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515574" comment="myspell-ar_YE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515575" comment="myspell-be_BY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515576" comment="myspell-bg_BG-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515577" comment="myspell-bn_BD-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515578" comment="myspell-bn_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515579" comment="myspell-bs-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515580" comment="myspell-bs_BA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515581" comment="myspell-ca-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515582" comment="myspell-ca_AD-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515583" comment="myspell-ca_ES-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515584" comment="myspell-ca_ES_valencia-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515585" comment="myspell-ca_FR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515586" comment="myspell-ca_IT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515587" comment="myspell-cs_CZ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515588" comment="myspell-da_DK-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515589" comment="myspell-de-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515590" comment="myspell-de_AT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515591" comment="myspell-de_CH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515592" comment="myspell-de_DE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515593" comment="myspell-dictionaries-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515594" comment="myspell-el_GR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515595" comment="myspell-en-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515596" comment="myspell-en_AU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515597" comment="myspell-en_BS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515598" comment="myspell-en_BZ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515599" comment="myspell-en_CA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515600" comment="myspell-en_GB-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515601" comment="myspell-en_GH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515602" comment="myspell-en_IE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515603" comment="myspell-en_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515604" comment="myspell-en_JM-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515605" comment="myspell-en_MW-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515606" comment="myspell-en_NA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515607" comment="myspell-en_NZ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515608" comment="myspell-en_PH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515609" comment="myspell-en_TT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515610" comment="myspell-en_US-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515611" comment="myspell-en_ZA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515612" comment="myspell-en_ZW-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515613" comment="myspell-es-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515614" comment="myspell-es_AR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515615" comment="myspell-es_BO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515616" comment="myspell-es_CL-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515617" comment="myspell-es_CO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515618" comment="myspell-es_CR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515619" comment="myspell-es_CU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515620" comment="myspell-es_DO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515621" comment="myspell-es_EC-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515622" comment="myspell-es_ES-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515623" comment="myspell-es_GT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515624" comment="myspell-es_HN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515625" comment="myspell-es_MX-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515626" comment="myspell-es_NI-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515627" comment="myspell-es_PA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515628" comment="myspell-es_PE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515629" comment="myspell-es_PR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515630" comment="myspell-es_PY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515631" comment="myspell-es_SV-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515632" comment="myspell-es_UY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515633" comment="myspell-es_VE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515634" comment="myspell-et_EE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515635" comment="myspell-fr_BE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515636" comment="myspell-fr_CA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515637" comment="myspell-fr_CH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515638" comment="myspell-fr_FR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515639" comment="myspell-fr_LU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515640" comment="myspell-fr_MC-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515641" comment="myspell-gu_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515642" comment="myspell-he_IL-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515643" comment="myspell-hi_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515644" comment="myspell-hr_HR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515645" comment="myspell-hu_HU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515646" comment="myspell-it_IT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515647" comment="myspell-lightproof-en-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515648" comment="myspell-lightproof-hu_HU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515649" comment="myspell-lightproof-pt_BR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515650" comment="myspell-lightproof-ru_RU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515651" comment="myspell-lo_LA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515652" comment="myspell-lt_LT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515653" comment="myspell-lv_LV-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515654" comment="myspell-nb_NO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515655" comment="myspell-nl_BE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515656" comment="myspell-nl_NL-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515657" comment="myspell-nn_NO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515658" comment="myspell-no-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515659" comment="myspell-pl_PL-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515660" comment="myspell-pt_AO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515661" comment="myspell-pt_BR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515662" comment="myspell-pt_PT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515663" comment="myspell-ro-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515664" comment="myspell-ro_RO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515665" comment="myspell-ru_RU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515666" comment="myspell-sk_SK-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515667" comment="myspell-sl_SI-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515668" comment="myspell-sr-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515669" comment="myspell-sr_CS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515670" comment="myspell-sr_Latn_CS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515671" comment="myspell-sr_Latn_RS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515672" comment="myspell-sr_RS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515673" comment="myspell-sv_FI-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515674" comment="myspell-sv_SE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515675" comment="myspell-te-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515676" comment="myspell-te_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515677" comment="myspell-th_TH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515678" comment="myspell-vi-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515679" comment="myspell-vi_VN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515680" comment="myspell-zu_ZA-20160511-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0795" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002146.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1415-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00050.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 5.0.5 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted LwpTocSuperLayout record in a LotusWordPro (lwp) document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<bugzilla href="https://bugzilla.suse.com/967014">SUSE bug 967014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967015">SUSE bug 967015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515487" comment="boost-license1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515488" comment="hunspell-1.3.2-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515489" comment="hunspell-32bit-1.3.2-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515490" comment="hunspell-tools-1.3.2-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515491" comment="libOpenCOLLADA0-1_3335ac1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515492" comment="libboost_atomic1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515493" comment="libboost_date_time1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515494" comment="libboost_filesystem1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515495" comment="libboost_iostreams1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515496" comment="libboost_program_options1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515497" comment="libboost_regex1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515498" comment="libboost_signals1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515499" comment="libboost_system1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515500" comment="libboost_thread1_54_0-1.54.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515501" comment="libcmis-0_5-5-0.5.1-8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515502" comment="libetonyek-0_1-1-0.1.6-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515503" comment="libhyphen0-2.8.8-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515504" comment="libixion-0_11-0-0.11.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515505" comment="liborcus-0_11-0-0.11.0-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515506" comment="libreoffice-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515507" comment="libreoffice-base-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515508" comment="libreoffice-base-drivers-mysql-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515509" comment="libreoffice-base-drivers-postgresql-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515510" comment="libreoffice-calc-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515511" comment="libreoffice-calc-extensions-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515512" comment="libreoffice-draw-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515513" comment="libreoffice-filters-optional-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515514" comment="libreoffice-gnome-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515515" comment="libreoffice-icon-theme-galaxy-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515516" comment="libreoffice-icon-theme-tango-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515517" comment="libreoffice-impress-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515518" comment="libreoffice-l10n-af-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515519" comment="libreoffice-l10n-ar-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515520" comment="libreoffice-l10n-ca-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515521" comment="libreoffice-l10n-cs-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515522" comment="libreoffice-l10n-da-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515523" comment="libreoffice-l10n-de-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515524" comment="libreoffice-l10n-en-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515525" comment="libreoffice-l10n-es-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515526" comment="libreoffice-l10n-fi-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515527" comment="libreoffice-l10n-fr-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515528" comment="libreoffice-l10n-gu-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515529" comment="libreoffice-l10n-hi-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515530" comment="libreoffice-l10n-hu-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515531" comment="libreoffice-l10n-it-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515532" comment="libreoffice-l10n-ja-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515533" comment="libreoffice-l10n-ko-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515534" comment="libreoffice-l10n-nb-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515535" comment="libreoffice-l10n-nl-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515536" comment="libreoffice-l10n-nn-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515537" comment="libreoffice-l10n-pl-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515538" comment="libreoffice-l10n-pt-BR-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515539" comment="libreoffice-l10n-pt-PT-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515540" comment="libreoffice-l10n-ru-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515541" comment="libreoffice-l10n-sk-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515542" comment="libreoffice-l10n-sv-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515543" comment="libreoffice-l10n-xh-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515544" comment="libreoffice-l10n-zh-Hans-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515545" comment="libreoffice-l10n-zh-Hant-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515546" comment="libreoffice-l10n-zu-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515547" comment="libreoffice-mailmerge-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515548" comment="libreoffice-math-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515549" comment="libreoffice-officebean-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515550" comment="libreoffice-pyuno-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515551" comment="libreoffice-writer-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515552" comment="libreoffice-writer-extensions-5.1.3.2-22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515553" comment="libvisio-0_1-1-0.1.5-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515554" comment="libwps-0_4-4-0.4.2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515555" comment="myspell-af_NA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515556" comment="myspell-af_ZA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515557" comment="myspell-ar-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515558" comment="myspell-ar_AE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515559" comment="myspell-ar_BH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515560" comment="myspell-ar_DZ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515561" comment="myspell-ar_EG-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515562" comment="myspell-ar_IQ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515563" comment="myspell-ar_JO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515564" comment="myspell-ar_KW-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515565" comment="myspell-ar_LB-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515566" comment="myspell-ar_LY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515567" comment="myspell-ar_MA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515568" comment="myspell-ar_OM-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515569" comment="myspell-ar_QA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515570" comment="myspell-ar_SA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515571" comment="myspell-ar_SD-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515572" comment="myspell-ar_SY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515573" comment="myspell-ar_TN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515574" comment="myspell-ar_YE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515575" comment="myspell-be_BY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515576" comment="myspell-bg_BG-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515577" comment="myspell-bn_BD-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515578" comment="myspell-bn_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515579" comment="myspell-bs-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515580" comment="myspell-bs_BA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515581" comment="myspell-ca-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515582" comment="myspell-ca_AD-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515583" comment="myspell-ca_ES-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515584" comment="myspell-ca_ES_valencia-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515585" comment="myspell-ca_FR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515586" comment="myspell-ca_IT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515587" comment="myspell-cs_CZ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515588" comment="myspell-da_DK-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515589" comment="myspell-de-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515590" comment="myspell-de_AT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515591" comment="myspell-de_CH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515592" comment="myspell-de_DE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515593" comment="myspell-dictionaries-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515594" comment="myspell-el_GR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515595" comment="myspell-en-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515596" comment="myspell-en_AU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515597" comment="myspell-en_BS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515598" comment="myspell-en_BZ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515599" comment="myspell-en_CA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515600" comment="myspell-en_GB-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515601" comment="myspell-en_GH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515602" comment="myspell-en_IE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515603" comment="myspell-en_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515604" comment="myspell-en_JM-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515605" comment="myspell-en_MW-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515606" comment="myspell-en_NA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515607" comment="myspell-en_NZ-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515608" comment="myspell-en_PH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515609" comment="myspell-en_TT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515610" comment="myspell-en_US-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515611" comment="myspell-en_ZA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515612" comment="myspell-en_ZW-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515613" comment="myspell-es-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515614" comment="myspell-es_AR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515615" comment="myspell-es_BO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515616" comment="myspell-es_CL-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515617" comment="myspell-es_CO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515618" comment="myspell-es_CR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515619" comment="myspell-es_CU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515620" comment="myspell-es_DO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515621" comment="myspell-es_EC-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515622" comment="myspell-es_ES-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515623" comment="myspell-es_GT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515624" comment="myspell-es_HN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515625" comment="myspell-es_MX-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515626" comment="myspell-es_NI-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515627" comment="myspell-es_PA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515628" comment="myspell-es_PE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515629" comment="myspell-es_PR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515630" comment="myspell-es_PY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515631" comment="myspell-es_SV-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515632" comment="myspell-es_UY-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515633" comment="myspell-es_VE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515634" comment="myspell-et_EE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515635" comment="myspell-fr_BE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515636" comment="myspell-fr_CA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515637" comment="myspell-fr_CH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515638" comment="myspell-fr_FR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515639" comment="myspell-fr_LU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515640" comment="myspell-fr_MC-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515641" comment="myspell-gu_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515642" comment="myspell-he_IL-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515643" comment="myspell-hi_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515644" comment="myspell-hr_HR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515645" comment="myspell-hu_HU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515646" comment="myspell-it_IT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515647" comment="myspell-lightproof-en-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515648" comment="myspell-lightproof-hu_HU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515649" comment="myspell-lightproof-pt_BR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515650" comment="myspell-lightproof-ru_RU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515651" comment="myspell-lo_LA-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515652" comment="myspell-lt_LT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515653" comment="myspell-lv_LV-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515654" comment="myspell-nb_NO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515655" comment="myspell-nl_BE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515656" comment="myspell-nl_NL-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515657" comment="myspell-nn_NO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515658" comment="myspell-no-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515659" comment="myspell-pl_PL-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515660" comment="myspell-pt_AO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515661" comment="myspell-pt_BR-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515662" comment="myspell-pt_PT-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515663" comment="myspell-ro-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515664" comment="myspell-ro_RO-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515665" comment="myspell-ru_RU-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515666" comment="myspell-sk_SK-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515667" comment="myspell-sl_SI-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515668" comment="myspell-sr-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515669" comment="myspell-sr_CS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515670" comment="myspell-sr_Latn_CS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515671" comment="myspell-sr_Latn_RS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515672" comment="myspell-sr_RS-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515673" comment="myspell-sv_FI-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515674" comment="myspell-sv_SE-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515675" comment="myspell-te-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515676" comment="myspell-te_IN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515677" comment="myspell-th_TH-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515678" comment="myspell-vi-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515679" comment="myspell-vi_VN-20160511-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515680" comment="myspell-zu_ZA-20160511-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
    <description>
    Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968265">SUSE bug 968265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969517">SUSE bug 969517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989345">SUSE bug 989345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017316" ref_url="https://www.suse.com/support/kb/doc/?id=7017316" source="SUSE-SU"/>
		<reference ref_id="TID7017317" ref_url="https://www.suse.com/support/kb/doc/?id=7017317" source="SUSE-SU"/>
		<reference ref_id="TID7017338" ref_url="https://www.suse.com/support/kb/doc/?id=7017338" source="SUSE-SU"/>
		<reference ref_id="TID7017374" ref_url="https://www.suse.com/support/kb/doc/?id=7017374" source="SUSE-SU"/>
		<reference ref_id="TID7021979" ref_url="https://www.suse.com/support/kb/doc/?id=7021979" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<bugzilla href="https://bugzilla.suse.com/1106871">SUSE bug 1106871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961377">SUSE bug 961377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0821" ref_url="https://www.suse.com/security/cve/CVE-2016-0821" source="SUSE CVE"/>
    <description>
    The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0821/">CVE-2016-0821</cve>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994624">SUSE bug 994624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0960" ref_url="https://www.suse.com/security/cve/CVE-2016-0960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0960/">CVE-2016-0960</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0961" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0961" ref_url="https://www.suse.com/security/cve/CVE-2016-0961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0961/">CVE-2016-0961</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0962" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0962" ref_url="https://www.suse.com/security/cve/CVE-2016-0962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0962/">CVE-2016-0962</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0963" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0963" ref_url="https://www.suse.com/security/cve/CVE-2016-0963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0993 and CVE-2016-1010.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0963/">CVE-2016-0963</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0964" ref_url="https://www.suse.com/security/cve/CVE-2016-0964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0964/">CVE-2016-0964</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0965" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0965" ref_url="https://www.suse.com/security/cve/CVE-2016-0965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0965/">CVE-2016-0965</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0966" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0966" ref_url="https://www.suse.com/security/cve/CVE-2016-0966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0966/">CVE-2016-0966</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0967" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0967" ref_url="https://www.suse.com/security/cve/CVE-2016-0967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0967/">CVE-2016-0967</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0968" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0968" ref_url="https://www.suse.com/security/cve/CVE-2016-0968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0968/">CVE-2016-0968</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0969" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0969" ref_url="https://www.suse.com/security/cve/CVE-2016-0969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0969/">CVE-2016-0969</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0970" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0970" ref_url="https://www.suse.com/security/cve/CVE-2016-0970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0970/">CVE-2016-0970</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0971" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0971" ref_url="https://www.suse.com/security/cve/CVE-2016-0971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0971/">CVE-2016-0971</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0972" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0972" ref_url="https://www.suse.com/security/cve/CVE-2016-0972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-17"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0972/">CVE-2016-0972</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0973" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0973" ref_url="https://www.suse.com/security/cve/CVE-2016-0973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the URLRequest object implementation in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via a URLLoader.load call, a different vulnerability than CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-18"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0973/">CVE-2016-0973</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0974" ref_url="https://www.suse.com/security/cve/CVE-2016-0974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0974/">CVE-2016-0974</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0975" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0975" ref_url="https://www.suse.com/security/cve/CVE-2016-0975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the instanceof function in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code by leveraging improper reference handling, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0975/">CVE-2016-0975</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0976" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0976" ref_url="https://www.suse.com/security/cve/CVE-2016-0976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0976/">CVE-2016-0976</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0977" ref_url="https://www.suse.com/security/cve/CVE-2016-0977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0977/">CVE-2016-0977</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0978" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0978" ref_url="https://www.suse.com/security/cve/CVE-2016-0978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0978/">CVE-2016-0978</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0979" ref_url="https://www.suse.com/security/cve/CVE-2016-0979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0979/">CVE-2016-0979</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0980" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0980" ref_url="https://www.suse.com/security/cve/CVE-2016-0980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0980/">CVE-2016-0980</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0981" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0981" ref_url="https://www.suse.com/security/cve/CVE-2016-0981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0980.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0981/">CVE-2016-0981</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0982" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0982" ref_url="https://www.suse.com/security/cve/CVE-2016-0982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0983, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0982/">CVE-2016-0982</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0983" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0983" ref_url="https://www.suse.com/security/cve/CVE-2016-0983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0983/">CVE-2016-0983</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0984" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0984" ref_url="https://www.suse.com/security/cve/CVE-2016-0984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0984/">CVE-2016-0984</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0985" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0985" ref_url="https://www.suse.com/security/cve/CVE-2016-0985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0985/">CVE-2016-0985</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0986" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0986" ref_url="https://www.suse.com/security/cve/CVE-2016-0986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0986/">CVE-2016-0986</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0987" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0987" ref_url="https://www.suse.com/security/cve/CVE-2016-0987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0987/">CVE-2016-0987</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0988" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0988" ref_url="https://www.suse.com/security/cve/CVE-2016-0988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0988/">CVE-2016-0988</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0989" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0989" ref_url="https://www.suse.com/security/cve/CVE-2016-0989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0989/">CVE-2016-0989</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0990" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0990" ref_url="https://www.suse.com/security/cve/CVE-2016-0990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0990/">CVE-2016-0990</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0991" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0991" ref_url="https://www.suse.com/security/cve/CVE-2016-0991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0991/">CVE-2016-0991</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0992" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0992" ref_url="https://www.suse.com/security/cve/CVE-2016-0992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0992/">CVE-2016-0992</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0993" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0993" ref_url="https://www.suse.com/security/cve/CVE-2016-0993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-1010.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0993/">CVE-2016-0993</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0994" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0994" ref_url="https://www.suse.com/security/cve/CVE-2016-0994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code by using the actionCallMethod opcode with crafted arguments, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0994/">CVE-2016-0994</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0995" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0995" ref_url="https://www.suse.com/security/cve/CVE-2016-0995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0995/">CVE-2016-0995</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0996" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0996" ref_url="https://www.suse.com/security/cve/CVE-2016-0996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the setInterval method in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via crafted arguments, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0996/">CVE-2016-0996</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0997" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0997" ref_url="https://www.suse.com/security/cve/CVE-2016-0997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0997/">CVE-2016-0997</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0998" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0998" ref_url="https://www.suse.com/security/cve/CVE-2016-0998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0998/">CVE-2016-0998</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0999" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0999" ref_url="https://www.suse.com/security/cve/CVE-2016-0999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0999/">CVE-2016-0999</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000" ref_url="https://www.suse.com/security/cve/CVE-2016-1000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, and CVE-2016-0999.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1000/">CVE-2016-1000</cve>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016169">SUSE bug 1016169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989170">SUSE bug 989170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989172">SUSE bug 989172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989532">SUSE bug 989532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989569">SUSE bug 989569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989989">SUSE bug 989989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989995">SUSE bug 989995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989997">SUSE bug 989997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990847">SUSE bug 990847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997861">SUSE bug 997861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1212-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14044-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914044-1.html" source="SUSE-SU"/>
		<reference ref_id="TID7018113" ref_url="https://www.suse.com/support/kb/doc/?id=7018113" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.html" source="SUSE-SU"/>
    <description>
    Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517500" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517501" comment="python3-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517502" comment="python3-base-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517503" comment="python3-curses-3.4.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159263" comment="python-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159265" comment="python-curses-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159269" comment="python-tk-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159274" comment="python3-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159275" comment="python3-curses-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512601" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512602" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516316" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516317" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516599" comment="libpython3_4m1_0-3.4.5-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516318" comment="python-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516319" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516320" comment="python-curses-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516321" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516322" comment="python-tk-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516323" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516600" comment="python3-3.4.5-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516601" comment="python3-base-3.4.5-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517156" comment="openssh-6.6p1-54.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517157" comment="openssh-askpass-gnome-6.6p1-54.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517158" comment="openssh-helpers-6.6p1-54.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518039" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518040" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518041" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1001" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1001" ref_url="https://www.suse.com/security/cve/CVE-2016-1001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1001/">CVE-2016-1001</cve>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016368">SUSE bug 1016368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10010" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-07"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016368">SUSE bug 1016368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196721">SUSE bug 1196721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518039" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518040" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518041" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00032.html" source="SUSE-SU"/>
    <description>
    authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517156" comment="openssh-6.6p1-54.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517157" comment="openssh-askpass-gnome-6.6p1-54.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517158" comment="openssh-helpers-6.6p1-54.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518039" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518040" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518041" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
    <description>
    The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035742">SUSE bug 1035742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073044">SUSE bug 1073044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092582">SUSE bug 1092582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518039" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518040" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518041" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516758" comment="xen-4.5.5_04-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516759" comment="xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516760" comment="xen-libs-4.5.5_04-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516761" comment="xen-libs-32bit-4.5.5_04-22.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1002" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1002" ref_url="https://www.suse.com/security/cve/CVE-2016-1002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1002/">CVE-2016-1002</cve>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516758" comment="xen-4.5.5_04-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516759" comment="xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516760" comment="xen-libs-4.5.5_04-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516761" comment="xen-libs-32bit-4.5.5_04-22.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10025" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00001.html" source="SUSE-SU"/>
    <description>
    VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<bugzilla href="https://bugzilla.suse.com/1014300">SUSE bug 1014300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10028" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<bugzilla href="https://bugzilla.suse.com/1017084">SUSE bug 1017084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017085">SUSE bug 1017085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185981">SUSE bug 1185981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10029" ref_url="https://www.suse.com/security/cve/CVE-2016-10029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10029/">CVE-2016-10029</cve>
	<bugzilla href="https://bugzilla.suse.com/1017081">SUSE bug 1017081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017082">SUSE bug 1017082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10040" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10040" ref_url="https://www.suse.com/security/cve/CVE-2016-10040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004250.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in QXmlSimpleReader in Qt 4.8.5 allows remote attackers to cause a denial of service (application crash) via a xml file with multiple nested open tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10040/">CVE-2016-10040</cve>
	<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519764" comment="libQtWebKit4-4.8.7+2.3.4-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519765" comment="libQtWebKit4-32bit-4.8.7+2.3.4-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519766" comment="libqca2-2.0.3-17.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519767" comment="libqca2-32bit-2.0.3-17.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519768" comment="libqt4-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519769" comment="libqt4-32bit-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519770" comment="libqt4-qt3support-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519771" comment="libqt4-qt3support-32bit-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519772" comment="libqt4-sql-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519773" comment="libqt4-sql-32bit-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519774" comment="libqt4-sql-mysql-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519775" comment="libqt4-sql-mysql-32bit-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519776" comment="libqt4-sql-postgresql-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519777" comment="libqt4-sql-postgresql-32bit-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519778" comment="libqt4-sql-sqlite-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519779" comment="libqt4-sql-sqlite-32bit-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519780" comment="libqt4-sql-unixODBC-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519781" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519782" comment="libqt4-x11-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519783" comment="libqt4-x11-32bit-4.8.7-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519784" comment="qt4-qtscript-0.2.0-11.2.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10044" ref_url="https://www.suse.com/security/cve/CVE-2016-10044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10044/">CVE-2016-10044</cve>
	<bugzilla href="https://bugzilla.suse.com/1023992">SUSE bug 1023992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10046" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<bugzilla href="https://bugzilla.suse.com/1016742">SUSE bug 1016742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10047" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10047" ref_url="https://www.suse.com/security/cve/CVE-2016-10047" source="SUSE CVE"/>
    <description>
    Memory leak in the NewXMLTree function in magick/xml-tree.c in ImageMagick before 6.9.4-7 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10047/">CVE-2016-10047</cve>
	<bugzilla href="https://bugzilla.suse.com/1017309">SUSE bug 1017309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10048" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10049" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick before 6.9.4-4 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1005" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1005" ref_url="https://www.suse.com/security/cve/CVE-2016-1005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, and CVE-2016-1002.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-17"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1005/">CVE-2016-1005</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10050" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10051" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10052" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10053" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10053" ref_url="https://www.suse.com/security/cve/CVE-2016-10053" source="SUSE CVE"/>
    <description>
    The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10053/">CVE-2016-10053</cve>
	<bugzilla href="https://bugzilla.suse.com/1017315">SUSE bug 1017315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10054" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10054" ref_url="https://www.suse.com/security/cve/CVE-2016-10054" source="SUSE CVE"/>
    <description>
    Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10054/">CVE-2016-10054</cve>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016585">SUSE bug 1016585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017316">SUSE bug 1017316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10055" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10055" ref_url="https://www.suse.com/security/cve/CVE-2016-10055" source="SUSE CVE"/>
    <description>
    Buffer overflow in the WritePDBImage function in coders/pdb.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10055/">CVE-2016-10055</cve>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016585">SUSE bug 1016585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017316">SUSE bug 1017316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10056" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10056" ref_url="https://www.suse.com/security/cve/CVE-2016-10056" source="SUSE CVE"/>
    <description>
    Buffer overflow in the sixel_decode function in coders/sixel.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10056/">CVE-2016-10056</cve>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016585">SUSE bug 1016585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017316">SUSE bug 1017316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10057" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10057" ref_url="https://www.suse.com/security/cve/CVE-2016-10057" source="SUSE CVE"/>
    <description>
    Buffer overflow in the WriteGROUP4Image function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10057/">CVE-2016-10057</cve>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016585">SUSE bug 1016585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017316">SUSE bug 1017316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10058" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10058" ref_url="https://www.suse.com/security/cve/CVE-2016-10058" source="SUSE CVE"/>
    <description>
    Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick before 6.9.6-3 allows remote attackers to cause a denial of service (memory consumption) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10058/">CVE-2016-10058</cve>
	<bugzilla href="https://bugzilla.suse.com/1017317">SUSE bug 1017317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10059" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.4-1 allows remote attackers to cause a denial of service (application crash) or have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1006" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1006" ref_url="https://www.suse.com/security/cve/CVE-2016-1006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to bypass the ASLR protection mechanism via JIT data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1006/">CVE-2016-1006</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10060" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10061" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10061" ref_url="https://www.suse.com/security/cve/CVE-2016-10061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The ReadGROUP4Image function in coders/tiff.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10061/">CVE-2016-10061</cve>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10062" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10062" ref_url="https://www.suse.com/security/cve/CVE-2016-10062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The ReadGROUP4Image function in coders/tiff.c in ImageMagick does not check the return value of the fwrite function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10062/">CVE-2016-10062</cve>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10063" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<bugzilla href="https://bugzilla.suse.com/1016589">SUSE bug 1016589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10064" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<bugzilla href="https://bugzilla.suse.com/1016590">SUSE bug 1016590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10065" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick before 7.0.1-0 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<bugzilla href="https://bugzilla.suse.com/1016591">SUSE bug 1016591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10068" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10069" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10069" ref_url="https://www.suse.com/security/cve/CVE-2016-10069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10069/">CVE-2016-10069</cve>
	<bugzilla href="https://bugzilla.suse.com/1017325">SUSE bug 1017325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10071" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0942-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1037-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00063.html" source="SUSE-SU"/>
    <description>
    The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149680">SUSE bug 1149680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517231" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517232" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517250" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517181" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517182" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088</cve>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014271">SUSE bug 1014271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00061.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122679">SUSE bug 1122679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00061.html" source="SUSE-SU"/>
    <description>
    Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122679">SUSE bug 1122679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00061.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122679">SUSE bug 1122679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10095" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7 and 4.0.8 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519147" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519148" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1010" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1010" ref_url="https://www.suse.com/security/cve/CVE-2016-1010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-0993.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1010/">CVE-2016-1010</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10109" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0178-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00099.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in pcsc-lite before 1.8.20 allows a remote attackers to cause denial of service (crash) via a command that uses "cardsList" after the handle has been released through the SCardReleaseContext function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109</cve>
	<bugzilla href="https://bugzilla.suse.com/1017902">SUSE bug 1017902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147770" comment="libpcsclite1-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147771" comment="libpcsclite1-32bit-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147772" comment="pcsc-lite-1.8.10-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512377" comment="libpcsclite1-1.8.10-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512378" comment="libpcsclite1-32bit-1.8.10-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512379" comment="pcsc-lite-1.8.10-7.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518088" comment="libpcsclite1-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518089" comment="libpcsclite1-32bit-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518090" comment="pcsc-lite-1.8.10-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1011" ref_url="https://www.suse.com/security/cve/CVE-2016-1011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1013, CVE-2016-1016, CVE-2016-1017, and CVE-2016-1031.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1011/">CVE-2016-1011</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1012" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1012" ref_url="https://www.suse.com/security/cve/CVE-2016-1012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1012/">CVE-2016-1012</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1013" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1013" ref_url="https://www.suse.com/security/cve/CVE-2016-1013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1016, CVE-2016-1017, and CVE-2016-1031.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1013/">CVE-2016-1013</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1014" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1014" ref_url="https://www.suse.com/security/cve/CVE-2016-1014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows local users to gain privileges via a Trojan horse resource in an unspecified directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1014/">CVE-2016-1014</cve>
	<bugzilla href="https://bugzilla.suse.com/1020381">SUSE bug 1020381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020429">SUSE bug 1020429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10144" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10145" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via vectors related to a string copy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10146" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in the caption and label handling code in ImageMagick allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10147" ref_url="https://www.suse.com/security/cve/CVE-2016-10147" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10147/">CVE-2016-10147</cve>
	<bugzilla href="https://bugzilla.suse.com/1020381">SUSE bug 1020381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020429">SUSE bug 1020429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1015" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1015" ref_url="https://www.suse.com/security/cve/CVE-2016-1015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code by overriding NetConnection object properties to leverage an unspecified "type confusion," a different vulnerability than CVE-2016-1019.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1015/">CVE-2016-1015</cve>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10150" ref_url="https://www.suse.com/security/cve/CVE-2016-10150" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10150/">CVE-2016-10150</cve>
	<bugzilla href="https://bugzilla.suse.com/1020693">SUSE bug 1020693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10153" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10153" ref_url="https://www.suse.com/security/cve/CVE-2016-10153" source="SUSE CVE"/>
    <description>
    The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10153/">CVE-2016-10153</cve>
	<bugzilla href="https://bugzilla.suse.com/1021253">SUSE bug 1021253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10154" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10154" ref_url="https://www.suse.com/security/cve/CVE-2016-10154" source="SUSE CVE"/>
    <description>
    The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10154/">CVE-2016-10154</cve>
	<bugzilla href="https://bugzilla.suse.com/1021254">SUSE bug 1021254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10155" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00058.html" source="SUSE-SU"/>
    <description>
    A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156</cve>
	<bugzilla href="https://bugzilla.suse.com/1020601">SUSE bug 1020601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021969">SUSE bug 1021969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159206" comment="libsystemd0-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159207" comment="libsystemd0-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159208" comment="libudev1-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159209" comment="libudev1-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159210" comment="systemd-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159211" comment="systemd-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159212" comment="systemd-bash-completion-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159213" comment="systemd-sysvinit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159214" comment="udev-228-142.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518078" comment="libsystemd0-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518079" comment="libsystemd0-32bit-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518080" comment="libudev1-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518081" comment="libudev1-32bit-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518082" comment="systemd-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518083" comment="systemd-32bit-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518084" comment="systemd-bash-completion-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518085" comment="systemd-sysvinit-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518086" comment="udev-228-132.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1016" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1016" ref_url="https://www.suse.com/security/cve/CVE-2016-1016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Transform object implementation in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via a flash.geom.Matrix callback, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1017, and CVE-2016-1031.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1016/">CVE-2016-1016</cve>
	<bugzilla href="https://bugzilla.suse.com/1021364">SUSE bug 1021364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021616">SUSE bug 1021616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10163" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10163" ref_url="https://www.suse.com/security/cve/CVE-2016-10163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10163/">CVE-2016-10163</cve>
	<bugzilla href="https://bugzilla.suse.com/1021616">SUSE bug 1021616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10164" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0557-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00103.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123144">SUSE bug 1123144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148436" comment="libXpm4-3.5.11-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148437" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517105" comment="libXpm4-3.5.11-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517106" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10165" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<bugzilla href="https://bugzilla.suse.com/1021364">SUSE bug 1021364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064069">SUSE bug 1064069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512209" comment="lcms2-2.7-9.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512210" comment="liblcms2-2-2.7-9.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512211" comment="liblcms2-2-32bit-2.7-9.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520287" comment="lcms2-2.7-9.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520288" comment="liblcms2-2-2.7-9.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520289" comment="liblcms2-2-32bit-2.7-9.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0588-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517107" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517108" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0588-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517107" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517108" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0588-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517107" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517108" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10169" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The read_code function in read_words.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172685" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518991" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1017" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1017" ref_url="https://www.suse.com/security/cve/CVE-2016-1017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the LoadVars.decode function in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1016, and CVE-2016-1031.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1017/">CVE-2016-1017</cve>
	<bugzilla href="https://bugzilla.suse.com/1021740">SUSE bug 1021740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10170" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The WriteCaffHeader function in cli/caff.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172685" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518991" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10171" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172685" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518991" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10172" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The read_new_config_info function in open_utils.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172685" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518991" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1018" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1018" ref_url="https://www.suse.com/security/cve/CVE-2016-1018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via crafted JPEG-XR data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1018/">CVE-2016-1018</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1019" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1019" ref_url="https://www.suse.com/security/cve/CVE-2016-1019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0987-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1019/">CVE-2016-1019</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0220-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00091.html" source="SUSE-SU"/>
    <description>
    The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123122">SUSE bug 1123122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170043" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518781" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0220-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00091.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518781" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170043" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518781" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0220-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00091.html" source="SUSE-SU"/>
    <description>
    The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123122">SUSE bug 1123122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170043" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518781" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacparse.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024014">SUSE bug 1024014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517271" comment="gstreamer-plugins-good-1.2.4-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517272" comment="gstreamer-plugins-good-lang-1.2.4-2.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518579" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024017">SUSE bug 1024017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517271" comment="gstreamer-plugins-good-1.2.4-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517272" comment="gstreamer-plugins-good-lang-1.2.4-2.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518579" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1020" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1020" ref_url="https://www.suse.com/security/cve/CVE-2016-1020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1020/">CVE-2016-1020</cve>
	<bugzilla href="https://bugzilla.suse.com/1023377">SUSE bug 1023377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10207" ref_url="https://www.suse.com/security/cve/CVE-2016-10207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00020.html" source="SUSE-SU"/>
    <description>
    The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10207/">CVE-2016-10207</cve>
	<bugzilla href="https://bugzilla.suse.com/1023012">SUSE bug 1023012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517112" comment="tigervnc-1.4.3-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517113" comment="xorg-x11-Xvnc-1.4.3-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518474" comment="libXvnc1-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518475" comment="tigervnc-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518476" comment="xorg-x11-Xvnc-1.6.0-16.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10208" ref_url="https://www.suse.com/security/cve/CVE-2016-10208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10208/">CVE-2016-10208</cve>
	<bugzilla href="https://bugzilla.suse.com/1023377">SUSE bug 1023377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10209" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10209" ref_url="https://www.suse.com/security/cve/CVE-2016-10209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    The archive_wstring_append_from_mbs function in archive_string.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10209/">CVE-2016-10209</cve>
	<bugzilla href="https://bugzilla.suse.com/1032089">SUSE bug 1032089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1021" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1021" ref_url="https://www.suse.com/security/cve/CVE-2016-1021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1021/">CVE-2016-1021</cve>
	<bugzilla href="https://bugzilla.suse.com/1024244">SUSE bug 1024244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10214" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_resource_attach_backing function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214</cve>
	<bugzilla href="https://bugzilla.suse.com/1024244">SUSE bug 1024244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10217" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10217" ref_url="https://www.suse.com/security/cve/CVE-2016-10217" source="SUSE CVE"/>
    <description>
    The pdf14_open function in base/gdevp14.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10217/">CVE-2016-10217</cve>
	<bugzilla href="https://bugzilla.suse.com/1032130">SUSE bug 1032130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10218" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10218" ref_url="https://www.suse.com/security/cve/CVE-2016-10218" source="SUSE CVE"/>
    <description>
    The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10218/">CVE-2016-10218</cve>
	<bugzilla href="https://bugzilla.suse.com/1032135">SUSE bug 1032135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1022" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1022" ref_url="https://www.suse.com/security/cve/CVE-2016-1022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1022/">CVE-2016-1022</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<bugzilla href="https://bugzilla.suse.com/1032120">SUSE bug 1032120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517452" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517453" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1023" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1023" ref_url="https://www.suse.com/security/cve/CVE-2016-1023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1023/">CVE-2016-1023</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1024" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1024" ref_url="https://www.suse.com/security/cve/CVE-2016-1024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1024/">CVE-2016-1024</cve>
	<bugzilla href="https://bugzilla.suse.com/1029704">SUSE bug 1029704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029705">SUSE bug 1029705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00016.html" source="SUSE-SU"/>
    <description>
    The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518890" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518891" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518892" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10245" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10245" ref_url="https://www.suse.com/security/cve/CVE-2016-10245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005588.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00000.html" source="SUSE-SU"/>
    <description>
    Insufficient sanitization of the query parameter in templates/html/search_opensearch.php could lead to reflected cross-site scripting or iframe injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10245/">CVE-2016-10245</cve>
	<bugzilla href="https://bugzilla.suse.com/1136364">SUSE bug 1136364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521492" comment="doxygen-1.8.6-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10248" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10248" ref_url="https://www.suse.com/security/cve/CVE-2016-10248" source="SUSE CVE"/>
    <description>
    The jpc_tsfb_synthesize function in jpc_tsfb.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) via vectors involving an empty sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10248/">CVE-2016-10248</cve>
	<bugzilla href="https://bugzilla.suse.com/1029705">SUSE bug 1029705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10249" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10249" ref_url="https://www.suse.com/security/cve/CVE-2016-10249" source="SUSE CVE"/>
    <description>
    Integer overflow in the jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10249/">CVE-2016-10249</cve>
	<bugzilla href="https://bugzilla.suse.com/1029704">SUSE bug 1029704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1025" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1025" ref_url="https://www.suse.com/security/cve/CVE-2016-1025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1025/">CVE-2016-1025</cve>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10251" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517251" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517252" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
    <description>
    The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254</cve>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
    <description>
    The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255</cve>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1026" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1026" ref_url="https://www.suse.com/security/cve/CVE-2016-1026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1026/">CVE-2016-1026</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031262">SUSE bug 1031262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10268" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6 and 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1027" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1027" ref_url="https://www.suse.com/security/cve/CVE-2016-1027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1027/">CVE-2016-1027</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<bugzilla href="https://bugzilla.suse.com/1031249">SUSE bug 1031249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<bugzilla href="https://bugzilla.suse.com/1031247">SUSE bug 1031247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1028" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1028" ref_url="https://www.suse.com/security/cve/CVE-2016-1028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1028/">CVE-2016-1028</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1029" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1029" ref_url="https://www.suse.com/security/cve/CVE-2016-1029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1032, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1029/">CVE-2016-1029</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1030" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1030" ref_url="https://www.suse.com/security/cve/CVE-2016-1030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1030/">CVE-2016-1030</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1031" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1031" ref_url="https://www.suse.com/security/cve/CVE-2016-1031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1016, and CVE-2016-1017.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1031/">CVE-2016-1031</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10317" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317</cve>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10318" ref_url="https://www.suse.com/security/cve/CVE-2016-10318" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    A missing authorization check in the fscrypt_process_policy function in fs/crypto/policy.c in the ext4 and f2fs filesystem encryption support in the Linux kernel before 4.7.4 allows a user to assign an encryption policy to a directory owned by a different user, potentially creating a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10318/">CVE-2016-10318</cve>
	<bugzilla href="https://bugzilla.suse.com/1032435">SUSE bug 1032435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1032" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1032" ref_url="https://www.suse.com/security/cve/CVE-2016-1032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, and CVE-2016-1033.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1032/">CVE-2016-1032</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10324" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10324" ref_url="https://www.suse.com/security/cve/CVE-2016-10324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002849.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00033.html" source="SUSE-SU"/>
    <description>
    In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10324/">CVE-2016-10324</cve>
	<bugzilla href="https://bugzilla.suse.com/1034574">SUSE bug 1034574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155050" comment="libosip2-3.5.0-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517334" comment="libosip2-3.5.0-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10325" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10325" ref_url="https://www.suse.com/security/cve/CVE-2016-10325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002849.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00033.html" source="SUSE-SU"/>
    <description>
    In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10325/">CVE-2016-10325</cve>
	<bugzilla href="https://bugzilla.suse.com/1034572">SUSE bug 1034572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155050" comment="libosip2-3.5.0-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517334" comment="libosip2-3.5.0-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10326" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10326" ref_url="https://www.suse.com/security/cve/CVE-2016-10326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002849.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00033.html" source="SUSE-SU"/>
    <description>
    In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10326/">CVE-2016-10326</cve>
	<bugzilla href="https://bugzilla.suse.com/1034571">SUSE bug 1034571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155050" comment="libosip2-3.5.0-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517334" comment="libosip2-3.5.0-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10327" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10327" ref_url="https://www.suse.com/security/cve/CVE-2016-10327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003174.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1851-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00065.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 2016-12-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the EnhWMFReader::ReadEnhWMF function in vcl/source/filter/wmf/enhwmf.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10327/">CVE-2016-10327</cve>
	<bugzilla href="https://bugzilla.suse.com/1034192">SUSE bug 1034192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517712" comment="libixion-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517713" comment="libmwaw-0_3-3-0.3.11-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517714" comment="liborcus-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517715" comment="libreoffice-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517716" comment="libreoffice-base-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517717" comment="libreoffice-base-drivers-mysql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517718" comment="libreoffice-base-drivers-postgresql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517719" comment="libreoffice-calc-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517720" comment="libreoffice-calc-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517721" comment="libreoffice-draw-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517722" comment="libreoffice-filters-optional-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517723" comment="libreoffice-gnome-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517724" comment="libreoffice-icon-theme-galaxy-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517725" comment="libreoffice-icon-theme-tango-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517726" comment="libreoffice-impress-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517727" comment="libreoffice-l10n-af-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517728" comment="libreoffice-l10n-ar-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517729" comment="libreoffice-l10n-ca-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517730" comment="libreoffice-l10n-cs-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517731" comment="libreoffice-l10n-da-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517732" comment="libreoffice-l10n-de-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517733" comment="libreoffice-l10n-en-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517734" comment="libreoffice-l10n-es-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517735" comment="libreoffice-l10n-fi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517736" comment="libreoffice-l10n-fr-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517737" comment="libreoffice-l10n-gu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517738" comment="libreoffice-l10n-hi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517739" comment="libreoffice-l10n-hu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517740" comment="libreoffice-l10n-it-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517741" comment="libreoffice-l10n-ja-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517742" comment="libreoffice-l10n-ko-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517743" comment="libreoffice-l10n-nb-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517744" comment="libreoffice-l10n-nl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517745" comment="libreoffice-l10n-nn-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517746" comment="libreoffice-l10n-pl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517747" comment="libreoffice-l10n-pt_BR-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517748" comment="libreoffice-l10n-pt_PT-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517749" comment="libreoffice-l10n-ro-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517750" comment="libreoffice-l10n-ru-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517751" comment="libreoffice-l10n-sk-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517752" comment="libreoffice-l10n-sv-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517753" comment="libreoffice-l10n-xh-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517754" comment="libreoffice-l10n-zh_CN-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517755" comment="libreoffice-l10n-zh_TW-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517756" comment="libreoffice-l10n-zu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517757" comment="libreoffice-mailmerge-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517758" comment="libreoffice-math-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517759" comment="libreoffice-officebean-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517760" comment="libreoffice-pyuno-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517761" comment="libreoffice-writer-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517762" comment="libreoffice-writer-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517763" comment="libreofficekit-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517764" comment="libstaroffice-0_0-0-0.0.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517765" comment="libzmf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517766" comment="myspell-af_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517767" comment="myspell-af_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517768" comment="myspell-ar-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517769" comment="myspell-ar_AE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517770" comment="myspell-ar_BH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517771" comment="myspell-ar_DZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517772" comment="myspell-ar_EG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517773" comment="myspell-ar_IQ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517774" comment="myspell-ar_JO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517775" comment="myspell-ar_KW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517776" comment="myspell-ar_LB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517777" comment="myspell-ar_LY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517778" comment="myspell-ar_MA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517779" comment="myspell-ar_OM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517780" comment="myspell-ar_QA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517781" comment="myspell-ar_SA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517782" comment="myspell-ar_SD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517783" comment="myspell-ar_SY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517784" comment="myspell-ar_TN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517785" comment="myspell-ar_YE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517786" comment="myspell-be_BY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517787" comment="myspell-bg_BG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517788" comment="myspell-bn_BD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517789" comment="myspell-bn_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517790" comment="myspell-bs-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517791" comment="myspell-bs_BA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517792" comment="myspell-ca-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517793" comment="myspell-ca_AD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517794" comment="myspell-ca_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517795" comment="myspell-ca_ES_valencia-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517796" comment="myspell-ca_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517797" comment="myspell-ca_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517798" comment="myspell-cs_CZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517799" comment="myspell-da_DK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517800" comment="myspell-de-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517801" comment="myspell-de_AT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517802" comment="myspell-de_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517803" comment="myspell-de_DE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517804" comment="myspell-dictionaries-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517805" comment="myspell-el_GR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517806" comment="myspell-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517807" comment="myspell-en_AU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517808" comment="myspell-en_BS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517809" comment="myspell-en_BZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517810" comment="myspell-en_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517811" comment="myspell-en_GB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517812" comment="myspell-en_GH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517813" comment="myspell-en_IE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517814" comment="myspell-en_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517815" comment="myspell-en_JM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517816" comment="myspell-en_MW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517817" comment="myspell-en_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517818" comment="myspell-en_NZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517819" comment="myspell-en_PH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517820" comment="myspell-en_TT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517821" comment="myspell-en_US-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517822" comment="myspell-en_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517823" comment="myspell-en_ZW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517824" comment="myspell-es-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517825" comment="myspell-es_AR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517826" comment="myspell-es_BO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517827" comment="myspell-es_CL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517828" comment="myspell-es_CO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517829" comment="myspell-es_CR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517830" comment="myspell-es_CU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517831" comment="myspell-es_DO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517832" comment="myspell-es_EC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517833" comment="myspell-es_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517834" comment="myspell-es_GT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517835" comment="myspell-es_HN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517836" comment="myspell-es_MX-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517837" comment="myspell-es_NI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517838" comment="myspell-es_PA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517839" comment="myspell-es_PE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517840" comment="myspell-es_PR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517841" comment="myspell-es_PY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517842" comment="myspell-es_SV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517843" comment="myspell-es_UY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517844" comment="myspell-es_VE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517845" comment="myspell-et_EE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517846" comment="myspell-fr_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517847" comment="myspell-fr_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517848" comment="myspell-fr_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517849" comment="myspell-fr_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517850" comment="myspell-fr_LU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517851" comment="myspell-fr_MC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517852" comment="myspell-gu_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517853" comment="myspell-he_IL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517854" comment="myspell-hi_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517855" comment="myspell-hr_HR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517856" comment="myspell-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517857" comment="myspell-it_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517858" comment="myspell-lightproof-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517859" comment="myspell-lightproof-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517860" comment="myspell-lightproof-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517861" comment="myspell-lightproof-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517862" comment="myspell-lo_LA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517863" comment="myspell-lt_LT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517864" comment="myspell-lv_LV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517865" comment="myspell-nb_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517866" comment="myspell-nl_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517867" comment="myspell-nl_NL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517868" comment="myspell-nn_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517869" comment="myspell-no-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517870" comment="myspell-pl_PL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517871" comment="myspell-pt_AO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517872" comment="myspell-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517873" comment="myspell-pt_PT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517874" comment="myspell-ro-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517875" comment="myspell-ro_RO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517876" comment="myspell-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517877" comment="myspell-sk_SK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517878" comment="myspell-sl_SI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517879" comment="myspell-sr-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517880" comment="myspell-sr_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517881" comment="myspell-sr_Latn_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517882" comment="myspell-sr_Latn_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517883" comment="myspell-sr_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517884" comment="myspell-sv_FI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517885" comment="myspell-sv_SE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517886" comment="myspell-te-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517887" comment="myspell-te_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517888" comment="myspell-th_TH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517889" comment="myspell-uk_UA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517890" comment="myspell-vi-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517891" comment="myspell-vi_VN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517892" comment="myspell-zu_ZA-20170511-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519257" comment="libixion-0_12-0-0.12.1-13.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519258" comment="libmwaw-0_3-3-0.3.11-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519259" comment="liborcus-0_12-0-0.12.1-10.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519260" comment="libreoffice-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519261" comment="libreoffice-base-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519262" comment="libreoffice-base-drivers-mysql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519263" comment="libreoffice-base-drivers-postgresql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519264" comment="libreoffice-calc-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519265" comment="libreoffice-calc-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519266" comment="libreoffice-draw-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519267" comment="libreoffice-filters-optional-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519268" comment="libreoffice-gnome-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519269" comment="libreoffice-icon-theme-galaxy-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519270" comment="libreoffice-icon-theme-tango-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519271" comment="libreoffice-impress-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519272" comment="libreoffice-l10n-af-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519273" comment="libreoffice-l10n-ar-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519274" comment="libreoffice-l10n-ca-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519275" comment="libreoffice-l10n-cs-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519276" comment="libreoffice-l10n-da-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519277" comment="libreoffice-l10n-de-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519278" comment="libreoffice-l10n-en-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519279" comment="libreoffice-l10n-es-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519280" comment="libreoffice-l10n-fi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519281" comment="libreoffice-l10n-fr-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519282" comment="libreoffice-l10n-gu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519283" comment="libreoffice-l10n-hi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519284" comment="libreoffice-l10n-hu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519285" comment="libreoffice-l10n-it-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519286" comment="libreoffice-l10n-ja-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519287" comment="libreoffice-l10n-ko-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519288" comment="libreoffice-l10n-nb-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519289" comment="libreoffice-l10n-nl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519290" comment="libreoffice-l10n-nn-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519291" comment="libreoffice-l10n-pl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519292" comment="libreoffice-l10n-pt_BR-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519293" comment="libreoffice-l10n-pt_PT-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519294" comment="libreoffice-l10n-ro-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519295" comment="libreoffice-l10n-ru-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519296" comment="libreoffice-l10n-sk-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519297" comment="libreoffice-l10n-sv-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519298" comment="libreoffice-l10n-xh-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519299" comment="libreoffice-l10n-zh_CN-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519300" comment="libreoffice-l10n-zh_TW-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519301" comment="libreoffice-l10n-zu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519302" comment="libreoffice-mailmerge-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519303" comment="libreoffice-math-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519304" comment="libreoffice-officebean-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519305" comment="libreoffice-pyuno-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519306" comment="libreoffice-writer-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519307" comment="libreoffice-writer-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519308" comment="libreofficekit-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519309" comment="libstaroffice-0_0-0-0.0.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519310" comment="libzmf-0_0-0-0.0.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519311" comment="myspell-af_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519312" comment="myspell-af_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519313" comment="myspell-ar-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519314" comment="myspell-ar_AE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519315" comment="myspell-ar_BH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519316" comment="myspell-ar_DZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519317" comment="myspell-ar_EG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519318" comment="myspell-ar_IQ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519319" comment="myspell-ar_JO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519320" comment="myspell-ar_KW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519321" comment="myspell-ar_LB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519322" comment="myspell-ar_LY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519323" comment="myspell-ar_MA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519324" comment="myspell-ar_OM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519325" comment="myspell-ar_QA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519326" comment="myspell-ar_SA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519327" comment="myspell-ar_SD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519328" comment="myspell-ar_SY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519329" comment="myspell-ar_TN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519330" comment="myspell-ar_YE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519331" comment="myspell-be_BY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519332" comment="myspell-bg_BG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519333" comment="myspell-bn_BD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519334" comment="myspell-bn_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519335" comment="myspell-bs-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519336" comment="myspell-bs_BA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519337" comment="myspell-ca-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519338" comment="myspell-ca_AD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519339" comment="myspell-ca_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519340" comment="myspell-ca_ES_valencia-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519341" comment="myspell-ca_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519342" comment="myspell-ca_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519343" comment="myspell-cs_CZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519344" comment="myspell-da_DK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519345" comment="myspell-de-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519346" comment="myspell-de_AT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519347" comment="myspell-de_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519348" comment="myspell-de_DE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519349" comment="myspell-dictionaries-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519350" comment="myspell-el_GR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519351" comment="myspell-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519352" comment="myspell-en_AU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519353" comment="myspell-en_BS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519354" comment="myspell-en_BZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519355" comment="myspell-en_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519356" comment="myspell-en_GB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519357" comment="myspell-en_GH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519358" comment="myspell-en_IE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519359" comment="myspell-en_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519360" comment="myspell-en_JM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519361" comment="myspell-en_MW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519362" comment="myspell-en_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519363" comment="myspell-en_NZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519364" comment="myspell-en_PH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519365" comment="myspell-en_TT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519366" comment="myspell-en_US-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519367" comment="myspell-en_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519368" comment="myspell-en_ZW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519369" comment="myspell-es-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519370" comment="myspell-es_AR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519371" comment="myspell-es_BO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519372" comment="myspell-es_CL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519373" comment="myspell-es_CO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519374" comment="myspell-es_CR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519375" comment="myspell-es_CU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519376" comment="myspell-es_DO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519377" comment="myspell-es_EC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519378" comment="myspell-es_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519379" comment="myspell-es_GT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519380" comment="myspell-es_HN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519381" comment="myspell-es_MX-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519382" comment="myspell-es_NI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519383" comment="myspell-es_PA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519384" comment="myspell-es_PE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519385" comment="myspell-es_PR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519386" comment="myspell-es_PY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519387" comment="myspell-es_SV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519388" comment="myspell-es_UY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519389" comment="myspell-es_VE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519390" comment="myspell-et_EE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519391" comment="myspell-fr_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519392" comment="myspell-fr_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519393" comment="myspell-fr_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519394" comment="myspell-fr_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519395" comment="myspell-fr_LU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519396" comment="myspell-fr_MC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519397" comment="myspell-gu_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519398" comment="myspell-he_IL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519399" comment="myspell-hi_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519400" comment="myspell-hr_HR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519401" comment="myspell-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519402" comment="myspell-it_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519403" comment="myspell-lightproof-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519404" comment="myspell-lightproof-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519405" comment="myspell-lightproof-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519406" comment="myspell-lightproof-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519407" comment="myspell-lo_LA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519408" comment="myspell-lt_LT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519409" comment="myspell-lv_LV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519410" comment="myspell-nb_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519411" comment="myspell-nl_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519412" comment="myspell-nl_NL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519413" comment="myspell-nn_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519414" comment="myspell-no-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519415" comment="myspell-pl_PL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519416" comment="myspell-pt_AO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519417" comment="myspell-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519418" comment="myspell-pt_PT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519419" comment="myspell-ro-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519420" comment="myspell-ro_RO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519421" comment="myspell-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519422" comment="myspell-sk_SK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519423" comment="myspell-sl_SI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519424" comment="myspell-sr-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519425" comment="myspell-sr_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519426" comment="myspell-sr_Latn_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519427" comment="myspell-sr_Latn_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519428" comment="myspell-sr_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519429" comment="myspell-sv_FI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519430" comment="myspell-sv_SE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519431" comment="myspell-te-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519432" comment="myspell-te_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519433" comment="myspell-th_TH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519434" comment="myspell-uk_UA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519435" comment="myspell-vi-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519436" comment="myspell-vi_VN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519437" comment="myspell-zu_ZA-20170511-16.2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1033" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1033" ref_url="https://www.suse.com/security/cve/CVE-2016-1033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, and CVE-2016-1032.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1033/">CVE-2016-1033</cve>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10349" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10349" ref_url="https://www.suse.com/security/cve/CVE-2016-10349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10349/">CVE-2016-10349</cve>
	<bugzilla href="https://bugzilla.suse.com/1037008">SUSE bug 1037008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10350" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10350" ref_url="https://www.suse.com/security/cve/CVE-2016-10350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10350/">CVE-2016-10350</cve>
	<bugzilla href="https://bugzilla.suse.com/1037009">SUSE bug 1037009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10371" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The TIFFWriteDirectoryTagCheckedRational function in tif_dirwrite.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<bugzilla href="https://bugzilla.suse.com/1038438">SUSE bug 1038438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10504" ref_url="https://www.suse.com/security/cve/CVE-2016-10504" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow vulnerability in the opj_mqc_byteout function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (application crash) via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10504/">CVE-2016-10504</cve>
	<bugzilla href="https://bugzilla.suse.com/1056351">SUSE bug 1056351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179594">SUSE bug 1179594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10505" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10505" ref_url="https://www.suse.com/security/cve/CVE-2016-10505" source="SUSE CVE"/>
    <description>
    NULL pointer dereference vulnerabilities in the imagetopnm function in convert.c, sycc444_to_rgb function in color.c, color_esycc_to_rgb function in color.c, and sycc422_to_rgb function in color.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10505/">CVE-2016-10505</cve>
	<bugzilla href="https://bugzilla.suse.com/1056363">SUSE bug 1056363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10506" ref_url="https://www.suse.com/security/cve/CVE-2016-10506" source="SUSE CVE"/>
    <description>
    Division-by-zero vulnerabilities in the functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10506/">CVE-2016-10506</cve>
	<bugzilla href="https://bugzilla.suse.com/1056396">SUSE bug 1056396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10507" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10507" ref_url="https://www.suse.com/security/cve/CVE-2016-10507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow vulnerability in the bmp24toimage function in convertbmp.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10507/">CVE-2016-10507</cve>
	<bugzilla href="https://bugzilla.suse.com/1056421">SUSE bug 1056421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518139" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10708" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2530-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00045.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519797" comment="openssh-7.2p2-74.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519798" comment="openssh-askpass-gnome-7.2p2-74.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519799" comment="openssh-helpers-7.2p2-74.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175223" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520881" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714</cve>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0903-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190903-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739</cve>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521815" comment="glibc-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521816" comment="glibc-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521817" comment="glibc-devel-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521818" comment="glibc-devel-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521819" comment="glibc-i18ndata-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521820" comment="glibc-locale-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521821" comment="glibc-locale-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521822" comment="nscd-2.22-100.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10746" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10746" ref_url="https://www.suse.com/security/cve/CVE-2016-10746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005815.html" source="SUSE-SU"/>
    <description>
    libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-10746/">CVE-2016-10746</cve>
	<bugzilla href="https://bugzilla.suse.com/1133150">SUSE bug 1133150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10764" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10764" ref_url="https://www.suse.com/security/cve/CVE-2016-10764" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.9.6, there is an off by one in the drivers/mtd/spi-nor/cadence-quadspi.c cqspi_setup_flash() function. There are CQSPI_MAX_CHIPSELECT elements in the -&gt;f_pdata array so the "&gt;" should be "&gt;=" instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10764/">CVE-2016-10764</cve>
	<bugzilla href="https://bugzilla.suse.com/1143183">SUSE bug 1143183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10905" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905</cve>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10906" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906</cve>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10907" ref_url="https://www.suse.com/security/cve/CVE-2016-10907" source="SUSE CVE"/>
    <description>
    An issue was discovered in drivers/iio/dac/ad5755.c in the Linux kernel before 4.8.6. There is an out of bounds write in the function ad5755_parse_dt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10907/">CVE-2016-10907</cve>
	<bugzilla href="https://bugzilla.suse.com/1146302">SUSE bug 1146302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1096" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1096" ref_url="https://www.suse.com/security/cve/CVE-2016-1096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1096/">CVE-2016-1096</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1097" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1097" ref_url="https://www.suse.com/security/cve/CVE-2016-1097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1097/">CVE-2016-1097</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1098" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1098" ref_url="https://www.suse.com/security/cve/CVE-2016-1098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1098/">CVE-2016-1098</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1099" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1099" ref_url="https://www.suse.com/security/cve/CVE-2016-1099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1099/">CVE-2016-1099</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1100" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1100" ref_url="https://www.suse.com/security/cve/CVE-2016-1100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1100/">CVE-2016-1100</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1101" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1101" ref_url="https://www.suse.com/security/cve/CVE-2016-1101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1101/">CVE-2016-1101</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1102" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1102" ref_url="https://www.suse.com/security/cve/CVE-2016-1102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1102/">CVE-2016-1102</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1103" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1103" ref_url="https://www.suse.com/security/cve/CVE-2016-1103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1103/">CVE-2016-1103</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1104" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1104" ref_url="https://www.suse.com/security/cve/CVE-2016-1104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1104/">CVE-2016-1104</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1105" ref_url="https://www.suse.com/security/cve/CVE-2016-1105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1105/">CVE-2016-1105</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1106" ref_url="https://www.suse.com/security/cve/CVE-2016-1106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1106/">CVE-2016-1106</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1107" ref_url="https://www.suse.com/security/cve/CVE-2016-1107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1107/">CVE-2016-1107</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1108" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1108" ref_url="https://www.suse.com/security/cve/CVE-2016-1108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1108/">CVE-2016-1108</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1109" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1109" ref_url="https://www.suse.com/security/cve/CVE-2016-1109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1109/">CVE-2016-1109</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1110" ref_url="https://www.suse.com/security/cve/CVE-2016-1110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1110/">CVE-2016-1110</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1181" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1181" ref_url="https://www.suse.com/security/cve/CVE-2016-1181" source="SUSE CVE"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021937" ref_url="https://www.suse.com/support/kb/doc/?id=7021937" source="SUSE-SU"/>
    <description>
    ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-15"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1181/">CVE-2016-1181</cve>
	<bugzilla href="https://bugzilla.suse.com/983684">SUSE bug 983684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983728">SUSE bug 983728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1182" ref_url="https://www.suse.com/security/cve/CVE-2016-1182" source="SUSE CVE"/>
		<reference ref_id="TID7018709" ref_url="https://www.suse.com/support/kb/doc/?id=7018709" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021937" ref_url="https://www.suse.com/support/kb/doc/?id=7021937" source="SUSE-SU"/>
    <description>
    ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1182/">CVE-2016-1182</cve>
	<bugzilla href="https://bugzilla.suse.com/983684">SUSE bug 983684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1779-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988770">SUSE bug 988770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988782">SUSE bug 988782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989127">SUSE bug 989127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515479" comment="glibc-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515480" comment="glibc-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515481" comment="glibc-devel-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515482" comment="glibc-devel-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515483" comment="glibc-i18ndata-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515484" comment="glibc-locale-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515485" comment="glibc-locale-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515486" comment="nscd-2.19-22.16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516243" comment="glibc-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516244" comment="glibc-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516245" comment="glibc-devel-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516246" comment="glibc-devel-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516247" comment="glibc-i18ndata-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516248" comment="glibc-locale-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516249" comment="glibc-locale-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516250" comment="nscd-2.19-38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237</cve>
	<bugzilla href="https://bugzilla.suse.com/986570">SUSE bug 986570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2011-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192011-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<bugzilla href="https://bugzilla.suse.com/1108749">SUSE bug 1108749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123389">SUSE bug 1123389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522005" comment="perl-Mail-SpamAssassin-3.4.2-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522006" comment="spamassassin-3.4.2-44.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516357" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516358" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516359" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516360" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00007.html" source="SUSE-SU"/>
    <description>
    vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173534">SUSE bug 1173534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157587" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157588" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157589" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516670" comment="gvim-7.4.326-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516671" comment="vim-7.4.326-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516672" comment="vim-data-7.4.326-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1255" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1255" ref_url="https://www.suse.com/security/cve/CVE-2016-1255" source="SUSE CVE"/>
    <description>
    The pg_ctlcluster script in postgresql-common package in Debian wheezy before 134wheezy5, in Debian jessie before 165+deb8u2, in Debian unstable before 178, in Ubuntu 12.04 LTS before 129ubuntu1.2, in Ubuntu 14.04 LTS before 154ubuntu1.1, in Ubuntu 16.04 LTS before 173ubuntu0.1, in Ubuntu 17.04 before 179ubuntu0.1, and in Ubuntu 17.10 before 184ubuntu1.1 allows local users to gain root privileges via a symlink attack on a logfile in /var/log/postgresql.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1255/">CVE-2016-1255</cve>
	<bugzilla href="https://bugzilla.suse.com/1016745">SUSE bug 1016745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'&lt;((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515833" comment="bind-libs-9.9.6P1-28.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515834" comment="bind-libs-32bit-9.9.6P1-28.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515835" comment="bind-utils-9.9.6P1-28.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516867" comment="bind-libs-9.9.6P1-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516868" comment="bind-libs-32bit-9.9.6P1-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516869" comment="bind-utils-9.9.6P1-38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515833" comment="bind-libs-9.9.6P1-28.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515834" comment="bind-libs-32bit-9.9.6P1-28.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515835" comment="bind-utils-9.9.6P1-28.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516867" comment="bind-libs-9.9.6P1-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516868" comment="bind-libs-32bit-9.9.6P1-38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516869" comment="bind-utils-9.9.6P1-38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1372" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1372" ref_url="https://www.suse.com/security/cve/CVE-2016-1372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00040.html" source="SUSE-SU"/>
    <description>
    ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted 7z file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1372/">CVE-2016-1372</cve>
	<bugzilla href="https://bugzilla.suse.com/984650">SUSE bug 984650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171463" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518950" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1513" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1513" ref_url="https://www.suse.com/security/cve/CVE-2016-1513" source="SUSE CVE"/>
    <description>
    The Impress tool in Apache OpenOffice 4.1.2 and earlier allows remote attackers to cause a denial of service (out-of-bounds read or write) or execute arbitrary code via crafted MetaActions in an (1) ODP or (2) OTP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1513/">CVE-2016-1513</cve>
	<bugzilla href="https://bugzilla.suse.com/991057">SUSE bug 991057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333957" comment="libreoffice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html" source="SUSE-SU"/>
    <description>
    The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154911" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154912" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174098" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174099" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515831" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515832" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html" source="SUSE-SU"/>
    <description>
    The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154911" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154912" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174098" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174099" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515797" comment="MozillaFirefox-38.6.1esr-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515798" comment="MozillaFirefox-translations-38.6.1esr-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515831" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515832" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html" source="SUSE-SU"/>
    <description>
    The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966438">SUSE bug 966438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154911" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154912" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174098" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174099" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515831" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515832" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1463-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<bugzilla href="https://bugzilla.suse.com/979005">SUSE bug 979005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516095" comment="libarchive13-3.1.2-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1544" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00029.html" source="SUSE-SU"/>
    <description>
    nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140889" comment="libnghttp2-14-1.7.1-1.84 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512359" comment="libnghttp2-14-32bit-1.7.1-1.84 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-&gt;dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0302-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" source="SUSE-SU"/>
    <description>
    mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515729" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515730" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1575" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1575" ref_url="https://www.suse.com/security/cve/CVE-2016-1575" source="SUSE CVE"/>
    <description>
    The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1575/">CVE-2016-1575</cve>
	<bugzilla href="https://bugzilla.suse.com/968092">SUSE bug 968092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="TID7017678" ref_url="https://www.suse.com/support/kb/doc/?id=7017678" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983144">SUSE bug 983144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516097" comment="kernel-default-3.12.55-52.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516098" comment="kernel-default-devel-3.12.55-52.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516099" comment="kernel-default-extra-3.12.55-52.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516100" comment="kernel-devel-3.12.55-52.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516101" comment="kernel-macros-3.12.55-52.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516102" comment="kernel-source-3.12.55-52.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516103" comment="kernel-syms-3.12.55-52.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516104" comment="kernel-xen-3.12.55-52.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516105" comment="kernel-xen-devel-3.12.55-52.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1585" ref_url="https://www.suse.com/security/cve/CVE-2016-1585" source="SUSE CVE"/>
    <description>
    In all versions of AppArmor mount rules are accidentally widened when compiled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1585/">CVE-2016-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/995594">SUSE bug 995594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334306" comment="apparmor is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1601" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00007.html" source="SUSE-SU"/>
    <description>
    yast2-users before 3.1.47, as used in SUSE Linux Enterprise 12 SP1, does not properly set empty password fields in /etc/shadow during an AutoYaST installation when the profile does not contain inst-sys users, which might allow attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<bugzilla href="https://bugzilla.suse.com/973639">SUSE bug 973639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974220">SUSE bug 974220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141177" comment="yast2-users-3.1.57-16.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159327" comment="yast2-users-3.2.11-1.47 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512639" comment="yast2-users-3.2.17-1.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517001" comment="yast2-users-3.1.41.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1602" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002102.html" source="SUSE-SU"/>
    <description>
    A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141131" comment="supportutils-3.0-85.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159308" comment="supportutils-3.0-94.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512621" comment="supportutils-3.0-95.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516065" comment="supportutils-3.0-82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1621" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1621" ref_url="https://www.suse.com/security/cve/CVE-2016-1621" source="SUSE CVE"/>
    <description>
    libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1621/">CVE-2016-1621</cve>
	<bugzilla href="https://bugzilla.suse.com/972021">SUSE bug 972021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334008" comment="libvpx is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<bugzilla href="https://bugzilla.suse.com/1174862">SUSE bug 1174862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981110">SUSE bug 981110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518693" comment="libxml2-2-2.9.4-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518694" comment="libxml2-2-32bit-2.9.4-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518695" comment="libxml2-tools-2.9.4-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518696" comment="python-libxml2-2.9.4-36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1856" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856" source="SUSE CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1857.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142138" comment="libwebkit2gtk3-lang-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1857" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857" source="SUSE CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1856.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142138" comment="libwebkit2gtk3-lang-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0217-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_pi_nextcprl function in JasPer 1.900.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1907" ref_url="https://www.suse.com/security/cve/CVE-2016-1907" source="SUSE CVE"/>
    <description>
    The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1907/">CVE-2016-1907</cve>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962495">SUSE bug 962495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1455-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00132.html" source="SUSE-SU"/>
    <description>
    The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516052" comment="openssh-6.6p1-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516053" comment="openssh-askpass-gnome-6.6p1-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516054" comment="openssh-helpers-6.6p1-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962321">SUSE bug 962321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1923" ref_url="https://www.suse.com/security/cve/CVE-2016-1923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005816.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the opj_j2k_update_image_data function in OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1923/">CVE-2016-1923</cve>
	<bugzilla href="https://bugzilla.suse.com/962522">SUSE bug 962522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522086" comment="libopenjp2-7-2.1.0-4.12.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515754" comment="MozillaFirefox-38.6.0esr-57.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515755" comment="MozillaFirefox-branding-SLE-31.0-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515756" comment="MozillaFirefox-translations-38.6.0esr-57.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515757" comment="libfreebl3-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515758" comment="libfreebl3-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515759" comment="libsoftokn3-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515760" comment="libsoftokn3-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515761" comment="mozilla-nss-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515762" comment="mozilla-nss-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515763" comment="mozilla-nss-certs-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515764" comment="mozilla-nss-certs-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515765" comment="mozilla-nss-sysinit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515766" comment="mozilla-nss-sysinit-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515767" comment="mozilla-nss-tools-3.20.2-37.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1931" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931</cve>
	<bugzilla href="https://bugzilla.suse.com/963633">SUSE bug 963633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515754" comment="MozillaFirefox-38.6.0esr-57.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515755" comment="MozillaFirefox-branding-SLE-31.0-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515756" comment="MozillaFirefox-translations-38.6.0esr-57.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515757" comment="libfreebl3-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515758" comment="libfreebl3-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515759" comment="libsoftokn3-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515760" comment="libsoftokn3-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515761" comment="mozilla-nss-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515762" comment="mozilla-nss-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515763" comment="mozilla-nss-certs-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515764" comment="mozilla-nss-certs-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515765" comment="mozilla-nss-sysinit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515766" comment="mozilla-nss-sysinit-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515767" comment="mozilla-nss-tools-3.20.2-37.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1937" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1937" ref_url="https://www.suse.com/security/cve/CVE-2016-1937" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1937/">CVE-2016-1937</cve>
	<bugzilla href="https://bugzilla.suse.com/963641">SUSE bug 963641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977736">SUSE bug 977736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515754" comment="MozillaFirefox-38.6.0esr-57.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515755" comment="MozillaFirefox-branding-SLE-31.0-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515756" comment="MozillaFirefox-translations-38.6.0esr-57.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515757" comment="libfreebl3-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515758" comment="libfreebl3-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515759" comment="libsoftokn3-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515760" comment="libsoftokn3-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515761" comment="mozilla-nss-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515762" comment="mozilla-nss-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515763" comment="mozilla-nss-certs-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515764" comment="mozilla-nss-certs-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515765" comment="mozilla-nss-sysinit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515766" comment="mozilla-nss-sysinit-32bit-3.20.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515767" comment="mozilla-nss-tools-3.20.2-37.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1949" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1949" ref_url="https://www.suse.com/security/cve/CVE-2016-1949" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0553-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00142.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 44.0.2 does not properly restrict the interaction between Service Workers and plugins, which allows remote attackers to bypass the Same Origin Policy via a crafted web site that triggers spoofed responses to requests that use NPAPI, as demonstrated by a request for a crossdomain.xml file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1949/">CVE-2016-1949</cve>
	<bugzilla href="https://bugzilla.suse.com/966438">SUSE bug 966438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970257">SUSE bug 970257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970377">SUSE bug 970377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970378">SUSE bug 970378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970379">SUSE bug 970379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970380">SUSE bug 970380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970381">SUSE bug 970381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970431">SUSE bug 970431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970433">SUSE bug 970433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange function in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact by making an SSL (1) DHE or (2) ECDHE handshake at a time of high memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0389-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00026.html" source="SUSE-SU"/>
    <description>
    The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<bugzilla href="https://bugzilla.suse.com/1028410">SUSE bug 1028410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158948" comment="cpio-2.11-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158949" comment="cpio-lang-2.11-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512068" comment="cpio-2.11-36.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512069" comment="cpio-lang-2.11-36.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517072" comment="cpio-2.11-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517073" comment="cpio-lang-2.11-32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2052" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2052" ref_url="https://www.suse.com/security/cve/CVE-2016-2052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003174.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2082-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00065.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than CVE-2015-8947.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2052/">CVE-2016-2052</cve>
	<bugzilla href="https://bugzilla.suse.com/963436">SUSE bug 963436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989564">SUSE bug 989564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517712" comment="libixion-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517713" comment="libmwaw-0_3-3-0.3.11-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517714" comment="liborcus-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517715" comment="libreoffice-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517716" comment="libreoffice-base-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517717" comment="libreoffice-base-drivers-mysql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517718" comment="libreoffice-base-drivers-postgresql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517719" comment="libreoffice-calc-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517720" comment="libreoffice-calc-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517721" comment="libreoffice-draw-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517722" comment="libreoffice-filters-optional-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517723" comment="libreoffice-gnome-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517724" comment="libreoffice-icon-theme-galaxy-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517725" comment="libreoffice-icon-theme-tango-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517726" comment="libreoffice-impress-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517727" comment="libreoffice-l10n-af-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517728" comment="libreoffice-l10n-ar-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517729" comment="libreoffice-l10n-ca-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517730" comment="libreoffice-l10n-cs-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517731" comment="libreoffice-l10n-da-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517732" comment="libreoffice-l10n-de-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517733" comment="libreoffice-l10n-en-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517734" comment="libreoffice-l10n-es-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517735" comment="libreoffice-l10n-fi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517736" comment="libreoffice-l10n-fr-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517737" comment="libreoffice-l10n-gu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517738" comment="libreoffice-l10n-hi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517739" comment="libreoffice-l10n-hu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517740" comment="libreoffice-l10n-it-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517741" comment="libreoffice-l10n-ja-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517742" comment="libreoffice-l10n-ko-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517743" comment="libreoffice-l10n-nb-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517744" comment="libreoffice-l10n-nl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517745" comment="libreoffice-l10n-nn-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517746" comment="libreoffice-l10n-pl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517747" comment="libreoffice-l10n-pt_BR-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517748" comment="libreoffice-l10n-pt_PT-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517749" comment="libreoffice-l10n-ro-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517750" comment="libreoffice-l10n-ru-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517751" comment="libreoffice-l10n-sk-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517752" comment="libreoffice-l10n-sv-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517753" comment="libreoffice-l10n-xh-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517754" comment="libreoffice-l10n-zh_CN-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517755" comment="libreoffice-l10n-zh_TW-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517756" comment="libreoffice-l10n-zu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517757" comment="libreoffice-mailmerge-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517758" comment="libreoffice-math-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517759" comment="libreoffice-officebean-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517760" comment="libreoffice-pyuno-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517761" comment="libreoffice-writer-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517762" comment="libreoffice-writer-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517763" comment="libreofficekit-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517764" comment="libstaroffice-0_0-0-0.0.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517765" comment="libzmf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517766" comment="myspell-af_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517767" comment="myspell-af_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517768" comment="myspell-ar-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517769" comment="myspell-ar_AE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517770" comment="myspell-ar_BH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517771" comment="myspell-ar_DZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517772" comment="myspell-ar_EG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517773" comment="myspell-ar_IQ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517774" comment="myspell-ar_JO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517775" comment="myspell-ar_KW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517776" comment="myspell-ar_LB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517777" comment="myspell-ar_LY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517778" comment="myspell-ar_MA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517779" comment="myspell-ar_OM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517780" comment="myspell-ar_QA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517781" comment="myspell-ar_SA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517782" comment="myspell-ar_SD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517783" comment="myspell-ar_SY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517784" comment="myspell-ar_TN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517785" comment="myspell-ar_YE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517786" comment="myspell-be_BY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517787" comment="myspell-bg_BG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517788" comment="myspell-bn_BD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517789" comment="myspell-bn_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517790" comment="myspell-bs-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517791" comment="myspell-bs_BA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517792" comment="myspell-ca-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517793" comment="myspell-ca_AD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517794" comment="myspell-ca_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517795" comment="myspell-ca_ES_valencia-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517796" comment="myspell-ca_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517797" comment="myspell-ca_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517798" comment="myspell-cs_CZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517799" comment="myspell-da_DK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517800" comment="myspell-de-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517801" comment="myspell-de_AT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517802" comment="myspell-de_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517803" comment="myspell-de_DE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517804" comment="myspell-dictionaries-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517805" comment="myspell-el_GR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517806" comment="myspell-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517807" comment="myspell-en_AU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517808" comment="myspell-en_BS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517809" comment="myspell-en_BZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517810" comment="myspell-en_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517811" comment="myspell-en_GB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517812" comment="myspell-en_GH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517813" comment="myspell-en_IE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517814" comment="myspell-en_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517815" comment="myspell-en_JM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517816" comment="myspell-en_MW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517817" comment="myspell-en_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517818" comment="myspell-en_NZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517819" comment="myspell-en_PH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517820" comment="myspell-en_TT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517821" comment="myspell-en_US-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517822" comment="myspell-en_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517823" comment="myspell-en_ZW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517824" comment="myspell-es-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517825" comment="myspell-es_AR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517826" comment="myspell-es_BO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517827" comment="myspell-es_CL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517828" comment="myspell-es_CO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517829" comment="myspell-es_CR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517830" comment="myspell-es_CU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517831" comment="myspell-es_DO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517832" comment="myspell-es_EC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517833" comment="myspell-es_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517834" comment="myspell-es_GT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517835" comment="myspell-es_HN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517836" comment="myspell-es_MX-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517837" comment="myspell-es_NI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517838" comment="myspell-es_PA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517839" comment="myspell-es_PE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517840" comment="myspell-es_PR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517841" comment="myspell-es_PY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517842" comment="myspell-es_SV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517843" comment="myspell-es_UY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517844" comment="myspell-es_VE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517845" comment="myspell-et_EE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517846" comment="myspell-fr_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517847" comment="myspell-fr_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517848" comment="myspell-fr_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517849" comment="myspell-fr_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517850" comment="myspell-fr_LU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517851" comment="myspell-fr_MC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517852" comment="myspell-gu_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517853" comment="myspell-he_IL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517854" comment="myspell-hi_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517855" comment="myspell-hr_HR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517856" comment="myspell-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517857" comment="myspell-it_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517858" comment="myspell-lightproof-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517859" comment="myspell-lightproof-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517860" comment="myspell-lightproof-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517861" comment="myspell-lightproof-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517862" comment="myspell-lo_LA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517863" comment="myspell-lt_LT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517864" comment="myspell-lv_LV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517865" comment="myspell-nb_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517866" comment="myspell-nl_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517867" comment="myspell-nl_NL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517868" comment="myspell-nn_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517869" comment="myspell-no-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517870" comment="myspell-pl_PL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517871" comment="myspell-pt_AO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517872" comment="myspell-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517873" comment="myspell-pt_PT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517874" comment="myspell-ro-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517875" comment="myspell-ro_RO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517876" comment="myspell-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517877" comment="myspell-sk_SK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517878" comment="myspell-sl_SI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517879" comment="myspell-sr-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517880" comment="myspell-sr_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517881" comment="myspell-sr_Latn_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517882" comment="myspell-sr_Latn_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517883" comment="myspell-sr_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517884" comment="myspell-sv_FI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517885" comment="myspell-sv_SE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517886" comment="myspell-te-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517887" comment="myspell-te_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517888" comment="myspell-th_TH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517889" comment="myspell-uk_UA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517890" comment="myspell-vi-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517891" comment="myspell-vi_VN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517892" comment="myspell-zu_ZA-20170511-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519257" comment="libixion-0_12-0-0.12.1-13.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519258" comment="libmwaw-0_3-3-0.3.11-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519259" comment="liborcus-0_12-0-0.12.1-10.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519260" comment="libreoffice-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519261" comment="libreoffice-base-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519262" comment="libreoffice-base-drivers-mysql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519263" comment="libreoffice-base-drivers-postgresql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519264" comment="libreoffice-calc-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519265" comment="libreoffice-calc-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519266" comment="libreoffice-draw-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519267" comment="libreoffice-filters-optional-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519268" comment="libreoffice-gnome-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519269" comment="libreoffice-icon-theme-galaxy-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519270" comment="libreoffice-icon-theme-tango-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519271" comment="libreoffice-impress-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519272" comment="libreoffice-l10n-af-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519273" comment="libreoffice-l10n-ar-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519274" comment="libreoffice-l10n-ca-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519275" comment="libreoffice-l10n-cs-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519276" comment="libreoffice-l10n-da-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519277" comment="libreoffice-l10n-de-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519278" comment="libreoffice-l10n-en-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519279" comment="libreoffice-l10n-es-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519280" comment="libreoffice-l10n-fi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519281" comment="libreoffice-l10n-fr-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519282" comment="libreoffice-l10n-gu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519283" comment="libreoffice-l10n-hi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519284" comment="libreoffice-l10n-hu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519285" comment="libreoffice-l10n-it-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519286" comment="libreoffice-l10n-ja-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519287" comment="libreoffice-l10n-ko-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519288" comment="libreoffice-l10n-nb-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519289" comment="libreoffice-l10n-nl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519290" comment="libreoffice-l10n-nn-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519291" comment="libreoffice-l10n-pl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519292" comment="libreoffice-l10n-pt_BR-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519293" comment="libreoffice-l10n-pt_PT-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519294" comment="libreoffice-l10n-ro-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519295" comment="libreoffice-l10n-ru-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519296" comment="libreoffice-l10n-sk-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519297" comment="libreoffice-l10n-sv-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519298" comment="libreoffice-l10n-xh-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519299" comment="libreoffice-l10n-zh_CN-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519300" comment="libreoffice-l10n-zh_TW-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519301" comment="libreoffice-l10n-zu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519302" comment="libreoffice-mailmerge-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519303" comment="libreoffice-math-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519304" comment="libreoffice-officebean-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519305" comment="libreoffice-pyuno-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519306" comment="libreoffice-writer-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519307" comment="libreoffice-writer-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519308" comment="libreofficekit-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519309" comment="libstaroffice-0_0-0-0.0.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519310" comment="libzmf-0_0-0-0.0.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519311" comment="myspell-af_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519312" comment="myspell-af_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519313" comment="myspell-ar-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519314" comment="myspell-ar_AE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519315" comment="myspell-ar_BH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519316" comment="myspell-ar_DZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519317" comment="myspell-ar_EG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519318" comment="myspell-ar_IQ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519319" comment="myspell-ar_JO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519320" comment="myspell-ar_KW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519321" comment="myspell-ar_LB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519322" comment="myspell-ar_LY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519323" comment="myspell-ar_MA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519324" comment="myspell-ar_OM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519325" comment="myspell-ar_QA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519326" comment="myspell-ar_SA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519327" comment="myspell-ar_SD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519328" comment="myspell-ar_SY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519329" comment="myspell-ar_TN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519330" comment="myspell-ar_YE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519331" comment="myspell-be_BY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519332" comment="myspell-bg_BG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519333" comment="myspell-bn_BD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519334" comment="myspell-bn_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519335" comment="myspell-bs-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519336" comment="myspell-bs_BA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519337" comment="myspell-ca-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519338" comment="myspell-ca_AD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519339" comment="myspell-ca_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519340" comment="myspell-ca_ES_valencia-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519341" comment="myspell-ca_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519342" comment="myspell-ca_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519343" comment="myspell-cs_CZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519344" comment="myspell-da_DK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519345" comment="myspell-de-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519346" comment="myspell-de_AT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519347" comment="myspell-de_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519348" comment="myspell-de_DE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519349" comment="myspell-dictionaries-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519350" comment="myspell-el_GR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519351" comment="myspell-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519352" comment="myspell-en_AU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519353" comment="myspell-en_BS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519354" comment="myspell-en_BZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519355" comment="myspell-en_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519356" comment="myspell-en_GB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519357" comment="myspell-en_GH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519358" comment="myspell-en_IE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519359" comment="myspell-en_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519360" comment="myspell-en_JM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519361" comment="myspell-en_MW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519362" comment="myspell-en_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519363" comment="myspell-en_NZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519364" comment="myspell-en_PH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519365" comment="myspell-en_TT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519366" comment="myspell-en_US-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519367" comment="myspell-en_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519368" comment="myspell-en_ZW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519369" comment="myspell-es-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519370" comment="myspell-es_AR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519371" comment="myspell-es_BO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519372" comment="myspell-es_CL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519373" comment="myspell-es_CO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519374" comment="myspell-es_CR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519375" comment="myspell-es_CU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519376" comment="myspell-es_DO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519377" comment="myspell-es_EC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519378" comment="myspell-es_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519379" comment="myspell-es_GT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519380" comment="myspell-es_HN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519381" comment="myspell-es_MX-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519382" comment="myspell-es_NI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519383" comment="myspell-es_PA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519384" comment="myspell-es_PE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519385" comment="myspell-es_PR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519386" comment="myspell-es_PY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519387" comment="myspell-es_SV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519388" comment="myspell-es_UY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519389" comment="myspell-es_VE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519390" comment="myspell-et_EE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519391" comment="myspell-fr_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519392" comment="myspell-fr_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519393" comment="myspell-fr_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519394" comment="myspell-fr_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519395" comment="myspell-fr_LU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519396" comment="myspell-fr_MC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519397" comment="myspell-gu_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519398" comment="myspell-he_IL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519399" comment="myspell-hi_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519400" comment="myspell-hr_HR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519401" comment="myspell-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519402" comment="myspell-it_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519403" comment="myspell-lightproof-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519404" comment="myspell-lightproof-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519405" comment="myspell-lightproof-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519406" comment="myspell-lightproof-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519407" comment="myspell-lo_LA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519408" comment="myspell-lt_LT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519409" comment="myspell-lv_LV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519410" comment="myspell-nb_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519411" comment="myspell-nl_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519412" comment="myspell-nl_NL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519413" comment="myspell-nn_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519414" comment="myspell-no-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519415" comment="myspell-pl_PL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519416" comment="myspell-pt_AO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519417" comment="myspell-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519418" comment="myspell-pt_PT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519419" comment="myspell-ro-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519420" comment="myspell-ro_RO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519421" comment="myspell-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519422" comment="myspell-sk_SK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519423" comment="myspell-sl_SI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519424" comment="myspell-sr-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519425" comment="myspell-sr_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519426" comment="myspell-sr_Latn_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519427" comment="myspell-sr_Latn_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519428" comment="myspell-sr_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519429" comment="myspell-sv_FI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519430" comment="myspell-sv_SE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519431" comment="myspell-te-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519432" comment="myspell-te_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519433" comment="myspell-th_TH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519434" comment="myspell-uk_UA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519435" comment="myspell-vi-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519436" comment="myspell-vi_VN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519437" comment="myspell-zu_ZA-20170511-16.2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2053" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053</cve>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979074">SUSE bug 979074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2070" ref_url="https://www.suse.com/security/cve/CVE-2016-2070" source="SUSE CVE"/>
    <description>
    The tcp_cwnd_reduction function in net/ipv4/tcp_input.c in the Linux kernel before 4.3.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via crafted TCP traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2070/">CVE-2016-2070</cve>
	<bugzilla href="https://bugzilla.suse.com/963761">SUSE bug 963761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073</cve>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2088" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2088" ref_url="https://www.suse.com/security/cve/CVE-2016-2088" source="SUSE CVE"/>
    <description>
    resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2088/">CVE-2016-2088</cve>
	<bugzilla href="https://bugzilla.suse.com/970074">SUSE bug 970074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2089" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0408-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2099" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1744-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1808-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<bugzilla href="https://bugzilla.suse.com/979208">SUSE bug 979208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516343" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516344" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989902">SUSE bug 989902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516018" comment="libopenssl1_0_0-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516019" comment="libopenssl1_0_0-32bit-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516020" comment="openssl-1.0.1i-27.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517005" comment="libopenssl1_0_0-1.0.1i-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517006" comment="libopenssl1_0_0-32bit-1.0.1i-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517007" comment="openssl-1.0.1i-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516018" comment="libopenssl1_0_0-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516019" comment="libopenssl1_0_0-32bit-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516020" comment="openssl-1.0.1i-27.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517005" comment="libopenssl1_0_0-1.0.1i-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517006" comment="libopenssl1_0_0-32bit-1.0.1i-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517007" comment="openssl-1.0.1i-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="TID7017793" ref_url="https://www.suse.com/support/kb/doc/?id=7017793" source="SUSE-SU"/>
		<reference ref_id="TID7017881" ref_url="https://www.suse.com/support/kb/doc/?id=7017881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516018" comment="libopenssl1_0_0-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516019" comment="libopenssl1_0_0-32bit-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516020" comment="openssl-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517005" comment="libopenssl1_0_0-1.0.1i-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517006" comment="libopenssl1_0_0-32bit-1.0.1i-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517007" comment="openssl-1.0.1i-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0487-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00075.html" source="SUSE-SU"/>
    <description>
    The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<bugzilla href="https://bugzilla.suse.com/1001502">SUSE bug 1001502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989345">SUSE bug 989345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996067">SUSE bug 996067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516018" comment="libopenssl1_0_0-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516019" comment="libopenssl1_0_0-32bit-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516020" comment="openssl-1.0.1i-27.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517154" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517155" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517093" comment="libopenssl1_0_0-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517094" comment="libopenssl1_0_0-32bit-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517095" comment="openssl-1.0.1i-54.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517154" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517155" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<bugzilla href="https://bugzilla.suse.com/1015243">SUSE bug 1015243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516018" comment="libopenssl1_0_0-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516019" comment="libopenssl1_0_0-32bit-1.0.1i-27.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516020" comment="openssl-1.0.1i-27.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517005" comment="libopenssl1_0_0-1.0.1i-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517006" comment="libopenssl1_0_0-32bit-1.0.1i-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517007" comment="openssl-1.0.1i-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1440-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html" source="SUSE-SU"/>
    <description>
    The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561693" comment="libdcerpc-binding0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561694" comment="libdcerpc-binding0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561695" comment="libdcerpc0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561696" comment="libdcerpc0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561697" comment="libgensec0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561698" comment="libgensec0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561699" comment="libndr-krb5pac0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561700" comment="libndr-krb5pac0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561701" comment="libndr-nbt0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561702" comment="libndr-nbt0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561703" comment="libndr-standard0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561704" comment="libndr-standard0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561705" comment="libndr0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561706" comment="libndr0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561707" comment="libnetapi0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561708" comment="libnetapi0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561709" comment="libregistry0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561710" comment="libsamba-credentials0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561711" comment="libsamba-credentials0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561712" comment="libsamba-hostconfig0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561713" comment="libsamba-hostconfig0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561714" comment="libsamba-passdb0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561715" comment="libsamba-passdb0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561716" comment="libsamba-util0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561717" comment="libsamba-util0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561718" comment="libsamdb0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561719" comment="libsamdb0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561720" comment="libsmbclient-raw0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561721" comment="libsmbclient-raw0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561722" comment="libsmbclient0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561723" comment="libsmbclient0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561724" comment="libsmbconf0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561725" comment="libsmbconf0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561726" comment="libsmbldap0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561727" comment="libsmbldap0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561728" comment="libtevent-util0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561729" comment="libtevent-util0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561730" comment="libwbclient0-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561731" comment="libwbclient0-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561732" comment="samba-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561733" comment="samba-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561734" comment="samba-client-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561735" comment="samba-client-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561736" comment="samba-doc-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561737" comment="samba-libs-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561738" comment="samba-libs-32bit-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561739" comment="samba-winbind-4.2.4-18.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561740" comment="samba-winbind-32bit-4.2.4-18.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561741" comment="libdcerpc-binding0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561742" comment="libdcerpc-binding0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561743" comment="libdcerpc0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561744" comment="libdcerpc0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561745" comment="libgensec0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561746" comment="libgensec0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561747" comment="libndr-krb5pac0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561748" comment="libndr-krb5pac0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561749" comment="libndr-nbt0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561750" comment="libndr-nbt0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561751" comment="libndr-standard0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561752" comment="libndr-standard0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561753" comment="libndr0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561754" comment="libndr0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561755" comment="libnetapi0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561756" comment="libnetapi0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561757" comment="libregistry0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561758" comment="libsamba-credentials0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561759" comment="libsamba-credentials0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561760" comment="libsamba-hostconfig0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561761" comment="libsamba-hostconfig0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561762" comment="libsamba-passdb0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561763" comment="libsamba-passdb0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561764" comment="libsamba-util0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561765" comment="libsamba-util0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561766" comment="libsamdb0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561767" comment="libsamdb0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561768" comment="libsmbclient-raw0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561769" comment="libsmbclient-raw0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561770" comment="libsmbclient0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561771" comment="libsmbclient0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561772" comment="libsmbconf0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561773" comment="libsmbconf0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561774" comment="libsmbldap0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561775" comment="libsmbldap0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561776" comment="libtevent-util0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561777" comment="libtevent-util0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561778" comment="libwbclient0-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561779" comment="libwbclient0-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561780" comment="samba-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561781" comment="samba-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561782" comment="samba-client-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561783" comment="samba-client-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561784" comment="samba-doc-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561785" comment="samba-libs-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561786" comment="samba-libs-32bit-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561787" comment="samba-winbind-4.2.4-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561788" comment="samba-winbind-32bit-4.2.4-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515950" comment="libdcerpc-binding0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515951" comment="libdcerpc-binding0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515952" comment="libdcerpc0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515953" comment="libdcerpc0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515954" comment="libgensec0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515955" comment="libgensec0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515956" comment="libndr-krb5pac0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515957" comment="libndr-krb5pac0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515958" comment="libndr-nbt0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515959" comment="libndr-nbt0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515960" comment="libndr-standard0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515961" comment="libndr-standard0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515962" comment="libndr0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515963" comment="libndr0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515964" comment="libnetapi0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515965" comment="libnetapi0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515966" comment="libregistry0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515967" comment="libsamba-credentials0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515968" comment="libsamba-credentials0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515969" comment="libsamba-hostconfig0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515970" comment="libsamba-hostconfig0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515971" comment="libsamba-passdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515972" comment="libsamba-passdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515973" comment="libsamba-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515974" comment="libsamba-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515975" comment="libsamdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515976" comment="libsamdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515977" comment="libsmbclient-raw0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515978" comment="libsmbclient-raw0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515979" comment="libsmbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515980" comment="libsmbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515981" comment="libsmbconf0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515982" comment="libsmbconf0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515983" comment="libsmbldap0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515984" comment="libsmbldap0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515985" comment="libtevent-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515986" comment="libtevent-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515987" comment="libwbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515988" comment="libwbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515989" comment="samba-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515990" comment="samba-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515991" comment="samba-client-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515992" comment="samba-client-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515993" comment="samba-doc-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515994" comment="samba-libs-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515995" comment="samba-libs-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515996" comment="samba-winbind-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515997" comment="samba-winbind-32bit-4.2.4-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516952" comment="libdcerpc-binding0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516953" comment="libdcerpc-binding0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516954" comment="libdcerpc0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516955" comment="libdcerpc0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516956" comment="libgensec0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516957" comment="libgensec0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516958" comment="libndr-krb5pac0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516959" comment="libndr-krb5pac0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516960" comment="libndr-nbt0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516961" comment="libndr-nbt0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516962" comment="libndr-standard0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516963" comment="libndr-standard0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516964" comment="libndr0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516965" comment="libndr0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516966" comment="libnetapi0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516967" comment="libnetapi0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516968" comment="libregistry0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516969" comment="libsamba-credentials0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516970" comment="libsamba-credentials0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516971" comment="libsamba-hostconfig0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516972" comment="libsamba-hostconfig0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516973" comment="libsamba-passdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516974" comment="libsamba-passdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516975" comment="libsamba-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516976" comment="libsamba-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516977" comment="libsamdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516978" comment="libsamdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516979" comment="libsmbclient-raw0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516980" comment="libsmbclient-raw0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516981" comment="libsmbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516982" comment="libsmbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516983" comment="libsmbconf0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516984" comment="libsmbconf0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516985" comment="libsmbldap0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516986" comment="libsmbldap0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516987" comment="libtevent-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516988" comment="libtevent-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516989" comment="libwbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516990" comment="libwbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516991" comment="samba-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516992" comment="samba-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516993" comment="samba-client-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516994" comment="samba-client-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516995" comment="samba-doc-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516996" comment="samba-libs-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516997" comment="samba-libs-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516998" comment="samba-winbind-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516999" comment="samba-winbind-32bit-4.2.4-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515950" comment="libdcerpc-binding0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515951" comment="libdcerpc-binding0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515952" comment="libdcerpc0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515953" comment="libdcerpc0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515954" comment="libgensec0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515955" comment="libgensec0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515956" comment="libndr-krb5pac0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515957" comment="libndr-krb5pac0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515958" comment="libndr-nbt0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515959" comment="libndr-nbt0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515960" comment="libndr-standard0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515961" comment="libndr-standard0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515962" comment="libndr0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515963" comment="libndr0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515964" comment="libnetapi0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515965" comment="libnetapi0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515966" comment="libregistry0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515967" comment="libsamba-credentials0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515968" comment="libsamba-credentials0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515969" comment="libsamba-hostconfig0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515970" comment="libsamba-hostconfig0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515971" comment="libsamba-passdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515972" comment="libsamba-passdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515973" comment="libsamba-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515974" comment="libsamba-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515975" comment="libsamdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515976" comment="libsamdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515977" comment="libsmbclient-raw0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515978" comment="libsmbclient-raw0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515979" comment="libsmbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515980" comment="libsmbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515981" comment="libsmbconf0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515982" comment="libsmbconf0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515983" comment="libsmbldap0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515984" comment="libsmbldap0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515985" comment="libtevent-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515986" comment="libtevent-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515987" comment="libwbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515988" comment="libwbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515989" comment="samba-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515990" comment="samba-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515991" comment="samba-client-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515992" comment="samba-client-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515993" comment="samba-doc-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515994" comment="samba-libs-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515995" comment="samba-libs-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515996" comment="samba-winbind-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515997" comment="samba-winbind-32bit-4.2.4-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516952" comment="libdcerpc-binding0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516953" comment="libdcerpc-binding0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516954" comment="libdcerpc0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516955" comment="libdcerpc0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516956" comment="libgensec0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516957" comment="libgensec0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516958" comment="libndr-krb5pac0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516959" comment="libndr-krb5pac0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516960" comment="libndr-nbt0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516961" comment="libndr-nbt0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516962" comment="libndr-standard0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516963" comment="libndr-standard0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516964" comment="libndr0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516965" comment="libndr0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516966" comment="libnetapi0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516967" comment="libnetapi0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516968" comment="libregistry0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516969" comment="libsamba-credentials0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516970" comment="libsamba-credentials0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516971" comment="libsamba-hostconfig0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516972" comment="libsamba-hostconfig0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516973" comment="libsamba-passdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516974" comment="libsamba-passdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516975" comment="libsamba-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516976" comment="libsamba-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516977" comment="libsamdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516978" comment="libsamdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516979" comment="libsmbclient-raw0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516980" comment="libsmbclient-raw0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516981" comment="libsmbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516982" comment="libsmbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516983" comment="libsmbconf0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516984" comment="libsmbconf0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516985" comment="libsmbldap0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516986" comment="libsmbldap0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516987" comment="libtevent-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516988" comment="libtevent-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516989" comment="libwbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516990" comment="libwbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516991" comment="samba-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516992" comment="samba-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516993" comment="samba-client-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516994" comment="samba-client-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516995" comment="samba-doc-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516996" comment="samba-libs-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516997" comment="samba-libs-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516998" comment="samba-winbind-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516999" comment="samba-winbind-32bit-4.2.4-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515950" comment="libdcerpc-binding0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515951" comment="libdcerpc-binding0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515952" comment="libdcerpc0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515953" comment="libdcerpc0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515954" comment="libgensec0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515955" comment="libgensec0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515956" comment="libndr-krb5pac0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515957" comment="libndr-krb5pac0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515958" comment="libndr-nbt0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515959" comment="libndr-nbt0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515960" comment="libndr-standard0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515961" comment="libndr-standard0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515962" comment="libndr0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515963" comment="libndr0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515964" comment="libnetapi0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515965" comment="libnetapi0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515966" comment="libregistry0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515967" comment="libsamba-credentials0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515968" comment="libsamba-credentials0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515969" comment="libsamba-hostconfig0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515970" comment="libsamba-hostconfig0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515971" comment="libsamba-passdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515972" comment="libsamba-passdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515973" comment="libsamba-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515974" comment="libsamba-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515975" comment="libsamdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515976" comment="libsamdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515977" comment="libsmbclient-raw0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515978" comment="libsmbclient-raw0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515979" comment="libsmbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515980" comment="libsmbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515981" comment="libsmbconf0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515982" comment="libsmbconf0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515983" comment="libsmbldap0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515984" comment="libsmbldap0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515985" comment="libtevent-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515986" comment="libtevent-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515987" comment="libwbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515988" comment="libwbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515989" comment="samba-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515990" comment="samba-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515991" comment="samba-client-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515992" comment="samba-client-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515993" comment="samba-doc-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515994" comment="samba-libs-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515995" comment="samba-libs-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515996" comment="samba-winbind-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515997" comment="samba-winbind-32bit-4.2.4-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516952" comment="libdcerpc-binding0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516953" comment="libdcerpc-binding0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516954" comment="libdcerpc0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516955" comment="libdcerpc0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516956" comment="libgensec0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516957" comment="libgensec0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516958" comment="libndr-krb5pac0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516959" comment="libndr-krb5pac0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516960" comment="libndr-nbt0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516961" comment="libndr-nbt0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516962" comment="libndr-standard0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516963" comment="libndr-standard0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516964" comment="libndr0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516965" comment="libndr0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516966" comment="libnetapi0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516967" comment="libnetapi0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516968" comment="libregistry0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516969" comment="libsamba-credentials0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516970" comment="libsamba-credentials0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516971" comment="libsamba-hostconfig0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516972" comment="libsamba-hostconfig0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516973" comment="libsamba-passdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516974" comment="libsamba-passdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516975" comment="libsamba-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516976" comment="libsamba-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516977" comment="libsamdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516978" comment="libsamdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516979" comment="libsmbclient-raw0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516980" comment="libsmbclient-raw0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516981" comment="libsmbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516982" comment="libsmbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516983" comment="libsmbconf0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516984" comment="libsmbconf0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516985" comment="libsmbldap0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516986" comment="libsmbldap0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516987" comment="libtevent-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516988" comment="libtevent-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516989" comment="libwbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516990" comment="libwbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516991" comment="samba-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516992" comment="samba-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516993" comment="samba-client-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516994" comment="samba-client-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516995" comment="samba-doc-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516996" comment="samba-libs-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516997" comment="samba-libs-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516998" comment="samba-winbind-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516999" comment="samba-winbind-32bit-4.2.4-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2114" ref_url="https://www.suse.com/security/cve/CVE-2016-2114" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2114/">CVE-2016-2114</cve>
	<bugzilla href="https://bugzilla.suse.com/973035">SUSE bug 973035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515950" comment="libdcerpc-binding0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515951" comment="libdcerpc-binding0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515952" comment="libdcerpc0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515953" comment="libdcerpc0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515954" comment="libgensec0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515955" comment="libgensec0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515956" comment="libndr-krb5pac0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515957" comment="libndr-krb5pac0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515958" comment="libndr-nbt0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515959" comment="libndr-nbt0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515960" comment="libndr-standard0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515961" comment="libndr-standard0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515962" comment="libndr0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515963" comment="libndr0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515964" comment="libnetapi0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515965" comment="libnetapi0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515966" comment="libregistry0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515967" comment="libsamba-credentials0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515968" comment="libsamba-credentials0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515969" comment="libsamba-hostconfig0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515970" comment="libsamba-hostconfig0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515971" comment="libsamba-passdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515972" comment="libsamba-passdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515973" comment="libsamba-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515974" comment="libsamba-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515975" comment="libsamdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515976" comment="libsamdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515977" comment="libsmbclient-raw0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515978" comment="libsmbclient-raw0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515979" comment="libsmbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515980" comment="libsmbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515981" comment="libsmbconf0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515982" comment="libsmbconf0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515983" comment="libsmbldap0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515984" comment="libsmbldap0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515985" comment="libtevent-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515986" comment="libtevent-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515987" comment="libwbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515988" comment="libwbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515989" comment="samba-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515990" comment="samba-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515991" comment="samba-client-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515992" comment="samba-client-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515993" comment="samba-doc-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515994" comment="samba-libs-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515995" comment="samba-libs-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515996" comment="samba-winbind-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515997" comment="samba-winbind-32bit-4.2.4-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516952" comment="libdcerpc-binding0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516953" comment="libdcerpc-binding0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516954" comment="libdcerpc0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516955" comment="libdcerpc0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516956" comment="libgensec0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516957" comment="libgensec0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516958" comment="libndr-krb5pac0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516959" comment="libndr-krb5pac0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516960" comment="libndr-nbt0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516961" comment="libndr-nbt0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516962" comment="libndr-standard0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516963" comment="libndr-standard0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516964" comment="libndr0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516965" comment="libndr0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516966" comment="libnetapi0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516967" comment="libnetapi0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516968" comment="libregistry0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516969" comment="libsamba-credentials0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516970" comment="libsamba-credentials0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516971" comment="libsamba-hostconfig0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516972" comment="libsamba-hostconfig0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516973" comment="libsamba-passdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516974" comment="libsamba-passdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516975" comment="libsamba-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516976" comment="libsamba-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516977" comment="libsamdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516978" comment="libsamdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516979" comment="libsmbclient-raw0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516980" comment="libsmbclient-raw0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516981" comment="libsmbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516982" comment="libsmbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516983" comment="libsmbconf0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516984" comment="libsmbconf0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516985" comment="libsmbldap0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516986" comment="libsmbldap0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516987" comment="libtevent-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516988" comment="libtevent-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516989" comment="libwbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516990" comment="libwbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516991" comment="samba-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516992" comment="samba-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516993" comment="samba-client-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516994" comment="samba-client-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516995" comment="samba-doc-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516996" comment="samba-libs-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516997" comment="samba-libs-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516998" comment="samba-winbind-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516999" comment="samba-winbind-32bit-4.2.4-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968697">SUSE bug 968697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="TID7017482" ref_url="https://www.suse.com/support/kb/doc/?id=7017482" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515950" comment="libdcerpc-binding0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515951" comment="libdcerpc-binding0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515952" comment="libdcerpc0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515953" comment="libdcerpc0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515954" comment="libgensec0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515955" comment="libgensec0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515956" comment="libndr-krb5pac0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515957" comment="libndr-krb5pac0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515958" comment="libndr-nbt0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515959" comment="libndr-nbt0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515960" comment="libndr-standard0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515961" comment="libndr-standard0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515962" comment="libndr0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515963" comment="libndr0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515964" comment="libnetapi0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515965" comment="libnetapi0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515966" comment="libregistry0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515967" comment="libsamba-credentials0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515968" comment="libsamba-credentials0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515969" comment="libsamba-hostconfig0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515970" comment="libsamba-hostconfig0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515971" comment="libsamba-passdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515972" comment="libsamba-passdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515973" comment="libsamba-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515974" comment="libsamba-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515975" comment="libsamdb0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515976" comment="libsamdb0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515977" comment="libsmbclient-raw0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515978" comment="libsmbclient-raw0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515979" comment="libsmbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515980" comment="libsmbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515981" comment="libsmbconf0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515982" comment="libsmbconf0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515983" comment="libsmbldap0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515984" comment="libsmbldap0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515985" comment="libtevent-util0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515986" comment="libtevent-util0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515987" comment="libwbclient0-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515988" comment="libwbclient0-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515989" comment="samba-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515990" comment="samba-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515991" comment="samba-client-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515992" comment="samba-client-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515993" comment="samba-doc-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515994" comment="samba-libs-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515995" comment="samba-libs-32bit-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515996" comment="samba-winbind-4.2.4-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515997" comment="samba-winbind-32bit-4.2.4-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516952" comment="libdcerpc-binding0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516953" comment="libdcerpc-binding0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516954" comment="libdcerpc0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516955" comment="libdcerpc0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516956" comment="libgensec0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516957" comment="libgensec0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516958" comment="libndr-krb5pac0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516959" comment="libndr-krb5pac0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516960" comment="libndr-nbt0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516961" comment="libndr-nbt0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516962" comment="libndr-standard0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516963" comment="libndr-standard0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516964" comment="libndr0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516965" comment="libndr0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516966" comment="libnetapi0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516967" comment="libnetapi0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516968" comment="libregistry0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516969" comment="libsamba-credentials0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516970" comment="libsamba-credentials0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516971" comment="libsamba-hostconfig0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516972" comment="libsamba-hostconfig0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516973" comment="libsamba-passdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516974" comment="libsamba-passdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516975" comment="libsamba-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516976" comment="libsamba-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516977" comment="libsamdb0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516978" comment="libsamdb0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516979" comment="libsmbclient-raw0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516980" comment="libsmbclient-raw0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516981" comment="libsmbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516982" comment="libsmbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516983" comment="libsmbconf0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516984" comment="libsmbconf0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516985" comment="libsmbldap0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516986" comment="libsmbldap0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516987" comment="libtevent-util0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516988" comment="libtevent-util0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516989" comment="libwbclient0-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516990" comment="libwbclient0-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516991" comment="samba-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516992" comment="samba-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516993" comment="samba-client-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516994" comment="samba-client-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516995" comment="samba-doc-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516996" comment="samba-libs-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516997" comment="samba-libs-32bit-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516998" comment="samba-winbind-4.2.4-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516999" comment="samba-winbind-32bit-4.2.4-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1830-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2371-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00086.html" source="SUSE-SU"/>
    <description>
    libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<bugzilla href="https://bugzilla.suse.com/986869">SUSE bug 986869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516368" comment="libdcerpc-binding0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516369" comment="libdcerpc-binding0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516370" comment="libdcerpc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516371" comment="libdcerpc0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516372" comment="libgensec0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516373" comment="libgensec0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516374" comment="libndr-krb5pac0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516375" comment="libndr-krb5pac0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516376" comment="libndr-nbt0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516377" comment="libndr-nbt0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516378" comment="libndr-standard0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516379" comment="libndr-standard0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516380" comment="libndr0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516381" comment="libndr0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516382" comment="libnetapi0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516383" comment="libnetapi0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516384" comment="libregistry0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516385" comment="libsamba-credentials0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516386" comment="libsamba-credentials0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516387" comment="libsamba-hostconfig0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516388" comment="libsamba-hostconfig0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516389" comment="libsamba-passdb0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516390" comment="libsamba-passdb0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516391" comment="libsamba-util0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516392" comment="libsamba-util0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516393" comment="libsamdb0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516394" comment="libsamdb0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516395" comment="libsmbclient-raw0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516396" comment="libsmbclient-raw0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516397" comment="libsmbclient0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516398" comment="libsmbclient0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516399" comment="libsmbconf0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516400" comment="libsmbconf0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516401" comment="libsmbldap0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516402" comment="libsmbldap0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516403" comment="libtevent-util0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516404" comment="libtevent-util0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516405" comment="libwbclient0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516406" comment="libwbclient0-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516407" comment="samba-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516408" comment="samba-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516409" comment="samba-client-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516410" comment="samba-client-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516411" comment="samba-doc-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516412" comment="samba-libs-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516413" comment="samba-libs-32bit-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516414" comment="samba-winbind-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516415" comment="samba-winbind-32bit-4.2.4-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00010.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<bugzilla href="https://bugzilla.suse.com/1014437">SUSE bug 1014437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516774" comment="libdcerpc-binding0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516775" comment="libdcerpc-binding0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516776" comment="libdcerpc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516777" comment="libdcerpc0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516778" comment="libgensec0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516779" comment="libgensec0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516780" comment="libndr-krb5pac0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516781" comment="libndr-krb5pac0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516782" comment="libndr-nbt0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516783" comment="libndr-nbt0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516784" comment="libndr-standard0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516785" comment="libndr-standard0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516786" comment="libndr0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516787" comment="libndr0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516788" comment="libnetapi0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516789" comment="libnetapi0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516790" comment="libregistry0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516791" comment="libsamba-credentials0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516792" comment="libsamba-credentials0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516793" comment="libsamba-hostconfig0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516794" comment="libsamba-hostconfig0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516795" comment="libsamba-passdb0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516796" comment="libsamba-passdb0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516797" comment="libsamba-util0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516798" comment="libsamba-util0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516799" comment="libsamdb0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516800" comment="libsamdb0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516801" comment="libsmbclient-raw0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516802" comment="libsmbclient-raw0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516803" comment="libsmbclient0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516804" comment="libsmbclient0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516805" comment="libsmbconf0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516806" comment="libsmbconf0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516807" comment="libsmbldap0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516808" comment="libsmbldap0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516809" comment="libtevent-util0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516810" comment="libtevent-util0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516811" comment="libwbclient0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516812" comment="libwbclient0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516813" comment="samba-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516814" comment="samba-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516815" comment="samba-client-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516816" comment="samba-client-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516817" comment="samba-doc-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516818" comment="samba-libs-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516819" comment="samba-libs-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516820" comment="samba-winbind-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516821" comment="samba-winbind-32bit-4.2.4-28.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517593" comment="libdcerpc-atsvc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517549" comment="libdcerpc-binding0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517550" comment="libdcerpc-binding0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517551" comment="libdcerpc0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517552" comment="libdcerpc0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517553" comment="libndr-krb5pac0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517554" comment="libndr-krb5pac0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517555" comment="libndr-nbt0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517556" comment="libndr-nbt0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517557" comment="libndr-standard0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517558" comment="libndr-standard0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517559" comment="libndr0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517560" comment="libndr0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517561" comment="libnetapi0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517562" comment="libnetapi0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517563" comment="libsamba-credentials0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517564" comment="libsamba-credentials0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517565" comment="libsamba-errors0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517566" comment="libsamba-errors0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517567" comment="libsamba-hostconfig0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517568" comment="libsamba-hostconfig0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517569" comment="libsamba-passdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517570" comment="libsamba-passdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517571" comment="libsamba-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517572" comment="libsamba-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517573" comment="libsamdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517574" comment="libsamdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517575" comment="libsmbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517576" comment="libsmbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517577" comment="libsmbconf0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517578" comment="libsmbconf0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517579" comment="libsmbldap0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517580" comment="libsmbldap0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517581" comment="libtevent-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517582" comment="libtevent-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517583" comment="libwbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517584" comment="libwbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517585" comment="samba-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517586" comment="samba-client-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517587" comment="samba-client-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517588" comment="samba-doc-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517589" comment="samba-libs-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517590" comment="samba-libs-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517591" comment="samba-winbind-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517592" comment="samba-winbind-32bit-4.4.2-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00010.html" source="SUSE-SU"/>
    <description>
    It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516774" comment="libdcerpc-binding0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516775" comment="libdcerpc-binding0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516776" comment="libdcerpc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516777" comment="libdcerpc0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516778" comment="libgensec0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516779" comment="libgensec0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516780" comment="libndr-krb5pac0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516781" comment="libndr-krb5pac0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516782" comment="libndr-nbt0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516783" comment="libndr-nbt0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516784" comment="libndr-standard0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516785" comment="libndr-standard0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516786" comment="libndr0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516787" comment="libndr0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516788" comment="libnetapi0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516789" comment="libnetapi0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516790" comment="libregistry0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516791" comment="libsamba-credentials0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516792" comment="libsamba-credentials0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516793" comment="libsamba-hostconfig0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516794" comment="libsamba-hostconfig0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516795" comment="libsamba-passdb0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516796" comment="libsamba-passdb0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516797" comment="libsamba-util0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516798" comment="libsamba-util0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516799" comment="libsamdb0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516800" comment="libsamdb0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516801" comment="libsmbclient-raw0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516802" comment="libsmbclient-raw0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516803" comment="libsmbclient0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516804" comment="libsmbclient0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516805" comment="libsmbconf0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516806" comment="libsmbconf0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516807" comment="libsmbldap0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516808" comment="libsmbldap0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516809" comment="libtevent-util0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516810" comment="libtevent-util0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516811" comment="libwbclient0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516812" comment="libwbclient0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516813" comment="samba-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516814" comment="samba-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516815" comment="samba-client-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516816" comment="samba-client-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516817" comment="samba-doc-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516818" comment="samba-libs-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516819" comment="samba-libs-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516820" comment="samba-winbind-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516821" comment="samba-winbind-32bit-4.2.4-28.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517593" comment="libdcerpc-atsvc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517549" comment="libdcerpc-binding0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517550" comment="libdcerpc-binding0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517551" comment="libdcerpc0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517552" comment="libdcerpc0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517553" comment="libndr-krb5pac0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517554" comment="libndr-krb5pac0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517555" comment="libndr-nbt0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517556" comment="libndr-nbt0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517557" comment="libndr-standard0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517558" comment="libndr-standard0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517559" comment="libndr0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517560" comment="libndr0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517561" comment="libnetapi0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517562" comment="libnetapi0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517563" comment="libsamba-credentials0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517564" comment="libsamba-credentials0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517565" comment="libsamba-errors0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517566" comment="libsamba-errors0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517567" comment="libsamba-hostconfig0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517568" comment="libsamba-hostconfig0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517569" comment="libsamba-passdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517570" comment="libsamba-passdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517571" comment="libsamba-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517572" comment="libsamba-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517573" comment="libsamdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517574" comment="libsamdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517575" comment="libsmbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517576" comment="libsmbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517577" comment="libsmbconf0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517578" comment="libsmbconf0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517579" comment="libsmbldap0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517580" comment="libsmbldap0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517581" comment="libtevent-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517582" comment="libtevent-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517583" comment="libwbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517584" comment="libwbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517585" comment="samba-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517586" comment="samba-client-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517587" comment="samba-client-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517588" comment="samba-doc-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517589" comment="samba-libs-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517590" comment="samba-libs-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517591" comment="samba-winbind-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517592" comment="samba-winbind-32bit-4.4.2-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00010.html" source="SUSE-SU"/>
    <description>
    Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516774" comment="libdcerpc-binding0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516775" comment="libdcerpc-binding0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516776" comment="libdcerpc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516777" comment="libdcerpc0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516778" comment="libgensec0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516779" comment="libgensec0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516780" comment="libndr-krb5pac0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516781" comment="libndr-krb5pac0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516782" comment="libndr-nbt0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516783" comment="libndr-nbt0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516784" comment="libndr-standard0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516785" comment="libndr-standard0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516786" comment="libndr0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516787" comment="libndr0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516788" comment="libnetapi0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516789" comment="libnetapi0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516790" comment="libregistry0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516791" comment="libsamba-credentials0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516792" comment="libsamba-credentials0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516793" comment="libsamba-hostconfig0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516794" comment="libsamba-hostconfig0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516795" comment="libsamba-passdb0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516796" comment="libsamba-passdb0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516797" comment="libsamba-util0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516798" comment="libsamba-util0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516799" comment="libsamdb0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516800" comment="libsamdb0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516801" comment="libsmbclient-raw0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516802" comment="libsmbclient-raw0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516803" comment="libsmbclient0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516804" comment="libsmbclient0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516805" comment="libsmbconf0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516806" comment="libsmbconf0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516807" comment="libsmbldap0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516808" comment="libsmbldap0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516809" comment="libtevent-util0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516810" comment="libtevent-util0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516811" comment="libwbclient0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516812" comment="libwbclient0-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516813" comment="samba-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516814" comment="samba-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516815" comment="samba-client-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516816" comment="samba-client-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516817" comment="samba-doc-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516818" comment="samba-libs-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516819" comment="samba-libs-32bit-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516820" comment="samba-winbind-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516821" comment="samba-winbind-32bit-4.2.4-28.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517593" comment="libdcerpc-atsvc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517549" comment="libdcerpc-binding0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517550" comment="libdcerpc-binding0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517551" comment="libdcerpc0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517552" comment="libdcerpc0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517553" comment="libndr-krb5pac0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517554" comment="libndr-krb5pac0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517555" comment="libndr-nbt0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517556" comment="libndr-nbt0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517557" comment="libndr-standard0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517558" comment="libndr-standard0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517559" comment="libndr0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517560" comment="libndr0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517561" comment="libnetapi0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517562" comment="libnetapi0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517563" comment="libsamba-credentials0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517564" comment="libsamba-credentials0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517565" comment="libsamba-errors0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517566" comment="libsamba-errors0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517567" comment="libsamba-hostconfig0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517568" comment="libsamba-hostconfig0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517569" comment="libsamba-passdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517570" comment="libsamba-passdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517571" comment="libsamba-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517572" comment="libsamba-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517573" comment="libsamdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517574" comment="libsamdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517575" comment="libsmbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517576" comment="libsmbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517577" comment="libsmbconf0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517578" comment="libsmbconf0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517579" comment="libsmbldap0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517580" comment="libsmbldap0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517581" comment="libtevent-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517582" comment="libtevent-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517583" comment="libwbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517584" comment="libwbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517585" comment="samba-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517586" comment="samba-client-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517587" comment="samba-client-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517588" comment="samba-doc-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517589" comment="samba-libs-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517590" comment="samba-libs-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517591" comment="samba-winbind-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517592" comment="samba-winbind-32bit-4.4.2-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993872">SUSE bug 993872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1725-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html" source="SUSE-SU"/>
    <description>
    SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516087" comment="libspice-server1-0.12.4-8.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517022" comment="libspice-server1-0.12.5-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176" source="SUSE CVE"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
    <description>
    The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<bugzilla href="https://bugzilla.suse.com/978224">SUSE bug 978224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999075">SUSE bug 999075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983519">SUSE bug 983519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995959">SUSE bug 995959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017985" ref_url="https://www.suse.com/support/kb/doc/?id=7017985" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="TID7020150" ref_url="https://www.suse.com/support/kb/doc/?id=7020150" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034689">SUSE bug 1034689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171693">SUSE bug 1171693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187</cve>
	<bugzilla href="https://bugzilla.suse.com/971919">SUSE bug 971919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<bugzilla href="https://bugzilla.suse.com/1067912">SUSE bug 1067912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132190">SUSE bug 1132190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2193" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2193" ref_url="https://www.suse.com/security/cve/CVE-2016-2193" source="SUSE CVE"/>
    <description>
    PostgreSQL before 9.5.x before 9.5.2 does not properly maintain row-security status in cached plans, which might allow attackers to bypass intended access restrictions by leveraging a session that performs queries as more than one role.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2193/">CVE-2016-2193</cve>
	<bugzilla href="https://bugzilla.suse.com/978456">SUSE bug 978456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2197" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2197" ref_url="https://www.suse.com/security/cve/CVE-2016-2197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with an IDE AHCI emulation support is vulnerable to a null pointer dereference flaw. It occurs while unmapping the Frame Information Structure (FIS) and Command List Block (CLB) entries. A privileged user inside guest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2197/">CVE-2016-2197</cve>
	<bugzilla href="https://bugzilla.suse.com/964411">SUSE bug 964411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964415">SUSE bug 964415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2233" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2233" ref_url="https://www.suse.com/security/cve/CVE-2016-2233" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.c in HexChat 2.10.2 allows remote IRC servers to cause a denial of service (crash) via a large number of options in a CAP LS message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2233/">CVE-2016-2233</cve>
	<bugzilla href="https://bugzilla.suse.com/1020738">SUSE bug 1020738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334362" comment="hexchat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2334" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2334" ref_url="https://www.suse.com/security/cve/CVE-2016-2334" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the NArchive::NHfs::CHandler::ExtractZlibFile method in 7zip before 16.00 and p7zip allows remote attackers to execute arbitrary code via a crafted HFS+ image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2334/">CVE-2016-2334</cve>
	<bugzilla href="https://bugzilla.suse.com/979822">SUSE bug 979822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334011" comment="p7zip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2335" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1464-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1850-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00069.html" source="SUSE-SU"/>
    <description>
    The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 7zip 9.20 and 15.05 beta and p7zip allows remote attackers to cause a denial of service (out-of-bounds read) or execute arbitrary code via the PartitionRef field in the Long Allocation Descriptor in a UDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<bugzilla href="https://bugzilla.suse.com/979823">SUSE bug 979823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128891" comment="p7zip-9.20.1-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171463" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516096" comment="p7zip-9.20.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2336" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2336" ref_url="https://www.suse.com/security/cve/CVE-2016-2336" source="SUSE CVE"/>
    <description>
    Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2336/">CVE-2016-2336</cve>
	<bugzilla href="https://bugzilla.suse.com/1018810">SUSE bug 1018810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2339" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<bugzilla href="https://bugzilla.suse.com/1018808">SUSE bug 1018808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517305" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517306" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517307" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2347" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2347" ref_url="https://www.suse.com/security/cve/CVE-2016-2347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00039.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2347/">CVE-2016-2347</cve>
	<bugzilla href="https://bugzilla.suse.com/973790">SUSE bug 973790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009126431" comment="lhasa-0.2.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009126432" comment="liblhasa0-0.2.0-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516002" comment="lhasa-0.2.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516003" comment="liblhasa0-0.2.0-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2374" ref_url="https://www.suse.com/security/cve/CVE-2016-2374" source="SUSE CVE"/>
    <description>
    An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2374/">CVE-2016-2374</cve>
	<bugzilla href="https://bugzilla.suse.com/984655">SUSE bug 984655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991690">SUSE bug 991690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334057" comment="pidgin is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2376" ref_url="https://www.suse.com/security/cve/CVE-2016-2376" source="SUSE CVE"/>
    <description>
    A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network traffic can send an invalid size for a packet which will trigger a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2376/">CVE-2016-2376</cve>
	<bugzilla href="https://bugzilla.suse.com/984655">SUSE bug 984655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991686">SUSE bug 991686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334057" comment="pidgin is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2377" ref_url="https://www.suse.com/security/cve/CVE-2016-2377" source="SUSE CVE"/>
    <description>
    A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent by the server could potentially result in an out-of-bounds write of one byte. A malicious server can send a negative content-length in response to a HTTP request triggering the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2377/">CVE-2016-2377</cve>
	<bugzilla href="https://bugzilla.suse.com/984655">SUSE bug 984655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991685">SUSE bug 991685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334057" comment="pidgin is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2378" ref_url="https://www.suse.com/security/cve/CVE-2016-2378" source="SUSE CVE"/>
    <description>
    A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2378/">CVE-2016-2378</cve>
	<bugzilla href="https://bugzilla.suse.com/984655">SUSE bug 984655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991683">SUSE bug 991683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334057" comment="pidgin is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2379" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2379" ref_url="https://www.suse.com/security/cve/CVE-2016-2379" source="SUSE CVE"/>
    <description>
    The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2379/">CVE-2016-2379</cve>
	<bugzilla href="https://bugzilla.suse.com/984655">SUSE bug 984655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991721">SUSE bug 991721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334057" comment="pidgin is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0881-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00057.html" source="SUSE-SU"/>
    <description>
    Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516357" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516358" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516359" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516360" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2383" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2383" ref_url="https://www.suse.com/security/cve/CVE-2016-2383" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2383/">CVE-2016-2383</cve>
	<bugzilla href="https://bugzilla.suse.com/966684">SUSE bug 966684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967773">SUSE bug 967773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967090">SUSE bug 967090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2399" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0552-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00102.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the quicktime_read_pascal function in libquicktime 1.2.4 and earlier allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted hdlr MP4 atom.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517159" comment="libquicktime0-1.2.4-10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517936" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2464" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2464" ref_url="https://www.suse.com/security/cve/CVE-2016-2464" source="SUSE CVE"/>
    <description>
    libvpx in libwebm in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted mkv file, aka internal bug 23167726.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2464/">CVE-2016-2464</cve>
	<bugzilla href="https://bugzilla.suse.com/984448">SUSE bug 984448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334008" comment="libvpx is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0660-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0661-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" source="SUSE-SU"/>
    <description>
    The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516042" comment="wireshark-1.12.11-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0660-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0661-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" source="SUSE-SU"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516042" comment="wireshark-1.12.11-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0660-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0661-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516042" comment="wireshark-1.12.11-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0660-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0661-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" source="SUSE-SU"/>
    <description>
    The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516042" comment="wireshark-1.12.11-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968004">SUSE bug 968004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1843-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515452" comment="dhcp-4.2.6-14.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515453" comment="dhcp-client-4.2.6-14.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516256" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516257" comment="dhcp-client-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517261" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517262" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517263" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7018100" ref_url="https://www.suse.com/support/kb/doc/?id=7018100" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00030.html" source="SUSE-SU"/>
    <description>
    buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001595">SUSE bug 1001595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001597">SUSE bug 1001597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516452" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516453" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516454" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779" source="SUSE CVE"/>
    <description>
    runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-05"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779</cve>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018892">SUSE bug 1018892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946429">SUSE bug 946429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968375">SUSE bug 968375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968674">SUSE bug 968674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968675">SUSE bug 968675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512244" comment="libblkid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512245" comment="libblkid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512246" comment="libfdisk1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512247" comment="libmount1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512248" comment="libmount1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512249" comment="libsmartcols1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512250" comment="libuuid-devel-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512251" comment="libuuid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512252" comment="libuuid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512253" comment="python-libmount-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512254" comment="util-linux-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512255" comment="util-linux-lang-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512256" comment="util-linux-systemd-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512257" comment="uuidd-2.29.2-7.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2785" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2785" ref_url="https://www.suse.com/security/cve/CVE-2016-2785" source="SUSE CVE"/>
    <description>
    Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2785/">CVE-2016-2785</cve>
	<bugzilla href="https://bugzilla.suse.com/977471">SUSE bug 977471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334293" comment="puppet is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2786" ref_url="https://www.suse.com/security/cve/CVE-2016-2786" source="SUSE CVE"/>
    <description>
    The pxp-agent component in Puppet Enterprise 2015.3.x before 2015.3.3 and Puppet Agent 1.3.x before 1.3.6 does not properly validate server certificates, which might allow remote attackers to spoof brokers and execute arbitrary commands via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2786/">CVE-2016-2786</cve>
	<bugzilla href="https://bugzilla.suse.com/983729">SUSE bug 983729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334293" comment="puppet is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2804" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2804" ref_url="https://www.suse.com/security/cve/CVE-2016-2804" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2804/">CVE-2016-2804</cve>
	<bugzilla href="https://bugzilla.suse.com/977373">SUSE bug 977373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox ESR 38.x before 38.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516026" comment="MozillaFirefox-38.8.0esr-66.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516027" comment="MozillaFirefox-translations-38.8.0esr-66.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806</cve>
	<bugzilla href="https://bugzilla.suse.com/977375">SUSE bug 977375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516026" comment="MozillaFirefox-38.8.0esr-66.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516027" comment="MozillaFirefox-translations-38.8.0esr-66.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516026" comment="MozillaFirefox-38.8.0esr-66.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516027" comment="MozillaFirefox-translations-38.8.0esr-66.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2809" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2809" ref_url="https://www.suse.com/security/cve/CVE-2016-2809" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service updater in Mozilla Firefox before 46.0 on Windows allows user-assisted remote attackers to delete arbitrary files by leveraging certain local file execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2809/">CVE-2016-2809</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977377">SUSE bug 977377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2810" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2810" ref_url="https://www.suse.com/security/cve/CVE-2016-2810" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 46.0 on Android before 5.0 allows attackers to bypass intended Signature access requirements via a crafted application that leverages content-provider permissions, as demonstrated by reading the browser history or a saved password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2810/">CVE-2016-2810</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977378">SUSE bug 977378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2811" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2811" ref_url="https://www.suse.com/security/cve/CVE-2016-2811" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2811/">CVE-2016-2811</cve>
	<bugzilla href="https://bugzilla.suse.com/977379">SUSE bug 977379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2812" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2812" ref_url="https://www.suse.com/security/cve/CVE-2016-2812" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2812/">CVE-2016-2812</cve>
	<bugzilla href="https://bugzilla.suse.com/977379">SUSE bug 977379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2813" ref_url="https://www.suse.com/security/cve/CVE-2016-2813" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 46.0 on Android does not properly restrict JavaScript access to orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment, and possibly discover PIN values, via a crafted web site, a similar issue to CVE-2016-1780.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2813/">CVE-2016-2813</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977380">SUSE bug 977380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516026" comment="MozillaFirefox-38.8.0esr-66.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516027" comment="MozillaFirefox-translations-38.8.0esr-66.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2816" ref_url="https://www.suse.com/security/cve/CVE-2016-2816" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2816/">CVE-2016-2816</cve>
	<bugzilla href="https://bugzilla.suse.com/977382">SUSE bug 977382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2817" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2817" ref_url="https://www.suse.com/security/cve/CVE-2016-2817" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2817/">CVE-2016-2817</cve>
	<bugzilla href="https://bugzilla.suse.com/977384">SUSE bug 977384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2820" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2820" ref_url="https://www.suse.com/security/cve/CVE-2016-2820" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2820/">CVE-2016-2820</cve>
	<bugzilla href="https://bugzilla.suse.com/977388">SUSE bug 977388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The TSymbolTableLevel class in ANGLE, as used in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows, allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact by triggering use of a WebGL shader that writes to an array.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2825" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2825" ref_url="https://www.suse.com/security/cve/CVE-2016-2825" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to bypass the Same Origin Policy and modify the location.host property via an invalid data: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2825/">CVE-2016-2825</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983649">SUSE bug 983649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2826" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2826" ref_url="https://www.suse.com/security/cve/CVE-2016-2826" source="SUSE CVE"/>
    <description>
    The maintenance service in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows does not prevent MAR extracted-file modification during updater execution, which might allow local users to gain privileges via a Trojan horse file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2826/">CVE-2016-2826</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983647">SUSE bug 983647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2829" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2829" ref_url="https://www.suse.com/security/cve/CVE-2016-2829" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to spoof permission notifications via a crafted web site that rapidly triggers permission requests, as demonstrated by the microphone permission or the geolocation permission.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2829/">CVE-2016-2829</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983644">SUSE bug 983644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983632">SUSE bug 983632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2832" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2832" ref_url="https://www.suse.com/security/cve/CVE-2016-2832" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to discover the list of disabled plugins via a fingerprinting attack involving Cascading Style Sheets (CSS) pseudo-classes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2832/">CVE-2016-2832</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983632">SUSE bug 983632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2833" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2833" ref_url="https://www.suse.com/security/cve/CVE-2016-2833" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2833/">CVE-2016-2833</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983640">SUSE bug 983640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2835" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2851" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124478" comment="libotr5-4.0.0-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515811" comment="libotr5-4.0.0-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857</cve>
	<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2858" ref_url="https://www.suse.com/security/cve/CVE-2016-2858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2858/">CVE-2016-2858</cve>
	<bugzilla href="https://bugzilla.suse.com/970036">SUSE bug 970036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3044" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3044" ref_url="https://www.suse.com/security/cve/CVE-2016-3044" source="SUSE CVE"/>
    <description>
    The Linux kernel component in IBM PowerKVM 2.1 before 2.1.1.3-65.10 and 3.1 before 3.1.0.2 allows guest OS users to cause a denial of service (host OS infinite loop and hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3044/">CVE-2016-3044</cve>
	<bugzilla href="https://bugzilla.suse.com/1013013">SUSE bug 1013013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3065" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3065" ref_url="https://www.suse.com/security/cve/CVE-2016-3065" source="SUSE CVE"/>
    <description>
    The (1) brin_page_type and (2) brin_metapage_info functions in the pageinspect extension in PostgreSQL before 9.5.x before 9.5.2 allows attackers to bypass intended access restrictions and consequently obtain sensitive server memory information or cause a denial of service (server crash) via a crafted bytea value in a BRIN index page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3065/">CVE-2016-3065</cve>
	<bugzilla href="https://bugzilla.suse.com/978456">SUSE bug 978456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3070" ref_url="https://www.suse.com/security/cve/CVE-2016-3070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3070/">CVE-2016-3070</cve>
	<bugzilla href="https://bugzilla.suse.com/979215">SUSE bug 979215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1779-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515479" comment="glibc-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515480" comment="glibc-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515481" comment="glibc-devel-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515482" comment="glibc-devel-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515483" comment="glibc-i18ndata-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515484" comment="glibc-locale-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515485" comment="glibc-locale-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515486" comment="nscd-2.19-22.16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516243" comment="glibc-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516244" comment="glibc-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516245" comment="glibc-devel-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516246" comment="glibc-devel-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516247" comment="glibc-i18ndata-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516248" comment="glibc-locale-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516249" comment="glibc-locale-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516250" comment="nscd-2.19-38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="TID7022313" ref_url="https://www.suse.com/support/kb/doc/?id=7022313" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1455-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00132.html" source="SUSE-SU"/>
    <description>
    Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059233">SUSE bug 1059233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992296">SUSE bug 992296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516052" comment="openssh-6.6p1-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516053" comment="openssh-askpass-gnome-6.6p1-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516054" comment="openssh-helpers-6.6p1-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html" source="SUSE-SU"/>
    <description>
    The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515945" comment="krb5-1.12.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515946" comment="krb5-32bit-1.12.1-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515947" comment="krb5-client-1.12.1-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002222.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html" source="SUSE-SU"/>
    <description>
    The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<bugzilla href="https://bugzilla.suse.com/991088">SUSE bug 991088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516338" comment="krb5-1.12.1-36.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516339" comment="krb5-32bit-1.12.1-36.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516340" comment="krb5-client-1.12.1-36.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971793">SUSE bug 971793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986377">SUSE bug 986377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3135" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135" source="SUSE CVE"/>
    <description>
    Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135</cve>
	<bugzilla href="https://bugzilla.suse.com/970904">SUSE bug 970904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971794">SUSE bug 971794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/970955">SUSE bug 970955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3139" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139</cve>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3177" ref_url="https://www.suse.com/security/cve/CVE-2016-3177" source="SUSE CVE"/>
    <description>
    Multiple use-after-free and double-free vulnerabilities in gifcolor.c in GIFLIB 5.1.2 have unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3177/">CVE-2016-3177</cve>
	<bugzilla href="https://bugzilla.suse.com/971555">SUSE bug 971555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338895" comment="giflib is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1103-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1206-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00056.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521995" comment="bzip2-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521996" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521997" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3190" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3190" ref_url="https://www.suse.com/security/cve/CVE-2016-3190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00029.html" source="SUSE-SU"/>
    <description>
    The fill_xrgb32_lerp_opaque_spans function in cairo-image-compositor.c in cairo before 1.14.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a negative span length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3190/">CVE-2016-3190</cve>
	<bugzilla href="https://bugzilla.suse.com/971964">SUSE bug 971964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516004" comment="libcairo-gobject2-1.12.16-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516005" comment="libcairo-gobject2-32bit-1.12.16-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516006" comment="libcairo2-1.12.16-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516007" comment="libcairo2-32bit-1.12.16-13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516004" comment="libcairo-gobject2-1.12.16-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516005" comment="libcairo-gobject2-32bit-1.12.16-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517000" comment="libcairo-script-interpreter2-1.12.16-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516006" comment="libcairo2-1.12.16-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516007" comment="libcairo2-32bit-1.12.16-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517008" comment="java-1_8_0-openjdk-1.8.0.91-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517009" comment="java-1_8_0-openjdk-headless-1.8.0.91-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517008" comment="java-1_8_0-openjdk-1.8.0.91-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517009" comment="java-1_8_0-openjdk-headless-1.8.0.91-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517008" comment="java-1_8_0-openjdk-1.8.0.91-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517009" comment="java-1_8_0-openjdk-headless-1.8.0.91-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<bugzilla href="https://bugzilla.suse.com/989732">SUSE bug 989732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2278-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516349" comment="libmysqlclient18-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516350" comment="libmysqlclient18-32bit-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516351" comment="libmysqlclient_r18-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516352" comment="libmysqlclient_r18-32bit-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516353" comment="mariadb-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516354" comment="mariadb-client-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516355" comment="mariadb-errormessages-10.0.26-9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3485" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2726-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989734">SUSE bug 989734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<bugzilla href="https://bugzilla.suse.com/1005555">SUSE bug 1005555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows remote attackers to affect availability via vectors related to JavaFX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<bugzilla href="https://bugzilla.suse.com/989729">SUSE bug 989729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<bugzilla href="https://bugzilla.suse.com/989730">SUSE bug 989730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3503" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<bugzilla href="https://bugzilla.suse.com/989728">SUSE bug 989728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<bugzilla href="https://bugzilla.suse.com/989731">SUSE bug 989731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3511" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2726-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989727">SUSE bug 989727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2278-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516349" comment="libmysqlclient18-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516350" comment="libmysqlclient18-32bit-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516351" comment="libmysqlclient_r18-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516352" comment="libmysqlclient_r18-32bit-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516353" comment="mariadb-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516354" comment="mariadb-client-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516355" comment="mariadb-errormessages-10.0.26-9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<bugzilla href="https://bugzilla.suse.com/989733">SUSE bug 989733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3552" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552</cve>
	<bugzilla href="https://bugzilla.suse.com/989726">SUSE bug 989726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587</cve>
	<bugzilla href="https://bugzilla.suse.com/989721">SUSE bug 989721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998845">SUSE bug 998845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2726-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989723">SUSE bug 989723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<bugzilla href="https://bugzilla.suse.com/989722">SUSE bug 989722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<bugzilla href="https://bugzilla.suse.com/989725">SUSE bug 989725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2278-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516349" comment="libmysqlclient18-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516350" comment="libmysqlclient18-32bit-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516351" comment="libmysqlclient_r18-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516352" comment="libmysqlclient_r18-32bit-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516353" comment="mariadb-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516354" comment="mariadb-client-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516355" comment="mariadb-errormessages-10.0.26-9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3616" ref_url="https://www.suse.com/security/cve/CVE-2016-3616" source="SUSE CVE"/>
    <description>
    The cjpeg utility in libjpeg allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or execute arbitrary code via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3616/">CVE-2016-3616</cve>
	<bugzilla href="https://bugzilla.suse.com/1160884">SUSE bug 1160884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334089" comment="libjpeg-turbo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<bugzilla href="https://bugzilla.suse.com/974617">SUSE bug 974617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516526" comment="libtiff5-4.0.6-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516527" comment="libtiff5-32bit-4.0.6-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3624" ref_url="https://www.suse.com/security/cve/CVE-2016-3624" source="SUSE CVE"/>
    <description>
    The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the "-v" option to -1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3624/">CVE-2016-3624</cve>
	<bugzilla href="https://bugzilla.suse.com/974617">SUSE bug 974617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3625" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3625" ref_url="https://www.suse.com/security/cve/CVE-2016-3625" source="SUSE CVE"/>
    <description>
    tif_read.c in the tiff2bw tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3625/">CVE-2016-3625</cve>
	<bugzilla href="https://bugzilla.suse.com/974615">SUSE bug 974615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1298-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
    <description>
    The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<bugzilla href="https://bugzilla.suse.com/1026099">SUSE bug 1026099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516014" comment="libxml2-2-2.9.1-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516015" comment="libxml2-2-32bit-2.9.1-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516016" comment="libxml2-tools-2.9.1-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516017" comment="python-libxml2-2.9.1-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
    <description>
    The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519749" comment="libtiff5-4.0.9-44.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519750" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3633" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3633" ref_url="https://www.suse.com/security/cve/CVE-2016-3633" source="SUSE CVE"/>
    <description>
    The setrow function in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the src variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3633/">CVE-2016-3633</cve>
	<bugzilla href="https://bugzilla.suse.com/974841">SUSE bug 974841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3634" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3634" ref_url="https://www.suse.com/security/cve/CVE-2016-3634" source="SUSE CVE"/>
    <description>
    The tagCompare function in tif_dirinfo.c in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to field_tag matching.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3634/">CVE-2016-3634</cve>
	<bugzilla href="https://bugzilla.suse.com/974839">SUSE bug 974839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<bugzilla href="https://bugzilla.suse.com/974840">SUSE bug 974840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672</cve>
	<bugzilla href="https://bugzilla.suse.com/974308">SUSE bug 974308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<bugzilla href="https://bugzilla.suse.com/971628">SUSE bug 971628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3698" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698" source="SUSE CVE"/>
    <description>
    libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698</cve>
	<bugzilla href="https://bugzilla.suse.com/979645">SUSE bug 979645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142139" comment="libndp0-1.6-2.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1779-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997423">SUSE bug 997423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515479" comment="glibc-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515480" comment="glibc-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515481" comment="glibc-devel-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515482" comment="glibc-devel-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515483" comment="glibc-i18ndata-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515484" comment="glibc-locale-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515485" comment="glibc-locale-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515486" comment="nscd-2.19-22.16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516243" comment="glibc-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516244" comment="glibc-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516245" comment="glibc-devel-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516246" comment="glibc-devel-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516247" comment="glibc-i18ndata-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516248" comment="glibc-locale-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516249" comment="glibc-locale-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516250" comment="nscd-2.19-38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3713" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713" source="SUSE CVE"/>
    <description>
    The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713</cve>
	<bugzilla href="https://bugzilla.suse.com/979715">SUSE bug 979715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="TID7017647" ref_url="https://www.suse.com/support/kb/doc/?id=7017647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html" source="SUSE-SU"/>
    <description>
    The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516028" comment="ImageMagick-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516029" comment="libMagick++-6_Q16-3-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516030" comment="libMagickCore-6_Q16-1-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516032" comment="libMagickWand-6_Q16-1-6.8.8.1-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html" source="SUSE-SU"/>
    <description>
    The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516028" comment="ImageMagick-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516029" comment="libMagick++-6_Q16-3-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516030" comment="libMagickCore-6_Q16-1-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516032" comment="libMagickWand-6_Q16-1-6.8.8.1-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
    <description>
    The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516028" comment="ImageMagick-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516029" comment="libMagick++-6_Q16-3-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516030" comment="libMagickCore-6_Q16-1-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516032" comment="libMagickWand-6_Q16-1-6.8.8.1-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html" source="SUSE-SU"/>
    <description>
    The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516028" comment="ImageMagick-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516029" comment="libMagick++-6_Q16-3-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516030" comment="libMagickCore-6_Q16-1-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516032" comment="libMagickWand-6_Q16-1-6.8.8.1-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html" source="SUSE-SU"/>
    <description>
    The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516028" comment="ImageMagick-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516029" comment="libMagick++-6_Q16-3-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516030" comment="libMagickCore-6_Q16-1-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516032" comment="libMagickWand-6_Q16-1-6.8.8.1-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
    <description>
    The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-11"/>
	<updated date="2021-11-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992569">SUSE bug 992569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516526" comment="libtiff5-4.0.6-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516527" comment="libtiff5-32bit-4.0.6-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951</cve>
	<bugzilla href="https://bugzilla.suse.com/974418">SUSE bug 974418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010963.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1118-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1219-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00019.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516012" comment="libgif6-5.0.5-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516013" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516526" comment="libtiff5-4.0.6-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516527" comment="libtiff5-32bit-4.0.6-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<bugzilla href="https://bugzilla.suse.com/975070">SUSE bug 975070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516526" comment="libtiff5-4.0.6-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516527" comment="libtiff5-32bit-4.0.6-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4000" ref_url="https://www.suse.com/security/cve/CVE-2016-4000" source="SUSE CVE"/>
    <description>
    Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4000/">CVE-2016-4000</cve>
	<bugzilla href="https://bugzilla.suse.com/1044655">SUSE bug 1044655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<bugzilla href="https://bugzilla.suse.com/975128">SUSE bug 975128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" source="SUSE-SU"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159215" comment="libtasn1-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159216" comment="libtasn1-6-4.9-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159217" comment="libtasn1-6-32bit-4.9-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170495" comment="libtasn1-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170496" comment="libtasn1-6-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170497" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516106" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516107" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516108" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037</cve>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4108" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4108" ref_url="https://www.suse.com/security/cve/CVE-2016-4108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4108/">CVE-2016-4108</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4109" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4109" ref_url="https://www.suse.com/security/cve/CVE-2016-4109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4109/">CVE-2016-4109</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4110" ref_url="https://www.suse.com/security/cve/CVE-2016-4110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4110/">CVE-2016-4110</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4111" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4111" ref_url="https://www.suse.com/security/cve/CVE-2016-4111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4111/">CVE-2016-4111</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4112" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4112" ref_url="https://www.suse.com/security/cve/CVE-2016-4112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4112/">CVE-2016-4112</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4113" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4113" ref_url="https://www.suse.com/security/cve/CVE-2016-4113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4113/">CVE-2016-4113</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4114" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4114" ref_url="https://www.suse.com/security/cve/CVE-2016-4114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4114/">CVE-2016-4114</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4115" ref_url="https://www.suse.com/security/cve/CVE-2016-4115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4115/">CVE-2016-4115</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4116" ref_url="https://www.suse.com/security/cve/CVE-2016-4116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4116/">CVE-2016-4116</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4117" ref_url="https://www.suse.com/security/cve/CVE-2016-4117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00047.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in May 2016.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4117/">CVE-2016-4117</cve>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4122" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4122" ref_url="https://www.suse.com/security/cve/CVE-2016-4122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4122/">CVE-2016-4122</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4123" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4123" ref_url="https://www.suse.com/security/cve/CVE-2016-4123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4123/">CVE-2016-4123</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4124" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4124" ref_url="https://www.suse.com/security/cve/CVE-2016-4124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4124/">CVE-2016-4124</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4125" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4125" ref_url="https://www.suse.com/security/cve/CVE-2016-4125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4125/">CVE-2016-4125</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4127" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4127" ref_url="https://www.suse.com/security/cve/CVE-2016-4127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4127/">CVE-2016-4127</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4128" ref_url="https://www.suse.com/security/cve/CVE-2016-4128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4128/">CVE-2016-4128</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4129" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4129" ref_url="https://www.suse.com/security/cve/CVE-2016-4129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4129/">CVE-2016-4129</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4130" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4130" ref_url="https://www.suse.com/security/cve/CVE-2016-4130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4130/">CVE-2016-4130</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4131" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4131" ref_url="https://www.suse.com/security/cve/CVE-2016-4131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4131/">CVE-2016-4131</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4132" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4132" ref_url="https://www.suse.com/security/cve/CVE-2016-4132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4132/">CVE-2016-4132</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4133" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4133" ref_url="https://www.suse.com/security/cve/CVE-2016-4133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4133/">CVE-2016-4133</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4134" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4134" ref_url="https://www.suse.com/security/cve/CVE-2016-4134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4134/">CVE-2016-4134</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4135" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4135" ref_url="https://www.suse.com/security/cve/CVE-2016-4135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4135/">CVE-2016-4135</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4136" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4136" ref_url="https://www.suse.com/security/cve/CVE-2016-4136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4136/">CVE-2016-4136</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4137" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4137" ref_url="https://www.suse.com/security/cve/CVE-2016-4137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4137/">CVE-2016-4137</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4138" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4138" ref_url="https://www.suse.com/security/cve/CVE-2016-4138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4138/">CVE-2016-4138</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4139" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4139" ref_url="https://www.suse.com/security/cve/CVE-2016-4139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4139/">CVE-2016-4139</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4140" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4140" ref_url="https://www.suse.com/security/cve/CVE-2016-4140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4140/">CVE-2016-4140</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4141" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4141" ref_url="https://www.suse.com/security/cve/CVE-2016-4141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4141/">CVE-2016-4141</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4142" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4142" ref_url="https://www.suse.com/security/cve/CVE-2016-4142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4142/">CVE-2016-4142</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4143" ref_url="https://www.suse.com/security/cve/CVE-2016-4143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4143/">CVE-2016-4143</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4144" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4144" ref_url="https://www.suse.com/security/cve/CVE-2016-4144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4144/">CVE-2016-4144</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4145" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4145" ref_url="https://www.suse.com/security/cve/CVE-2016-4145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4145/">CVE-2016-4145</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4146" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4146" ref_url="https://www.suse.com/security/cve/CVE-2016-4146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4146/">CVE-2016-4146</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4147" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4147" ref_url="https://www.suse.com/security/cve/CVE-2016-4147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4147/">CVE-2016-4147</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4148" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4148" ref_url="https://www.suse.com/security/cve/CVE-2016-4148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4148/">CVE-2016-4148</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4149" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4149" ref_url="https://www.suse.com/security/cve/CVE-2016-4149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4149/">CVE-2016-4149</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4150" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4150" ref_url="https://www.suse.com/security/cve/CVE-2016-4150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4150/">CVE-2016-4150</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4151" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4151" ref_url="https://www.suse.com/security/cve/CVE-2016-4151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4151/">CVE-2016-4151</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4152" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4152" ref_url="https://www.suse.com/security/cve/CVE-2016-4152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4152/">CVE-2016-4152</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4153" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4153" ref_url="https://www.suse.com/security/cve/CVE-2016-4153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4153/">CVE-2016-4153</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4154" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4154" ref_url="https://www.suse.com/security/cve/CVE-2016-4154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4154/">CVE-2016-4154</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4155" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4155" ref_url="https://www.suse.com/security/cve/CVE-2016-4155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4155/">CVE-2016-4155</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4156" ref_url="https://www.suse.com/security/cve/CVE-2016-4156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4156/">CVE-2016-4156</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4166" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4166" ref_url="https://www.suse.com/security/cve/CVE-2016-4166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4166/">CVE-2016-4166</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4171" ref_url="https://www.suse.com/security/cve/CVE-2016-4171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4171/">CVE-2016-4171</cve>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4172" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4172" ref_url="https://www.suse.com/security/cve/CVE-2016-4172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4172/">CVE-2016-4172</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4173" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4173" ref_url="https://www.suse.com/security/cve/CVE-2016-4173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4173/">CVE-2016-4173</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4174" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4174" ref_url="https://www.suse.com/security/cve/CVE-2016-4174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4174/">CVE-2016-4174</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4175" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4175" ref_url="https://www.suse.com/security/cve/CVE-2016-4175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4175/">CVE-2016-4175</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4176" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4176" ref_url="https://www.suse.com/security/cve/CVE-2016-4176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4177.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4176/">CVE-2016-4176</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4177" ref_url="https://www.suse.com/security/cve/CVE-2016-4177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4176.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4177/">CVE-2016-4177</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4178" ref_url="https://www.suse.com/security/cve/CVE-2016-4178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4178/">CVE-2016-4178</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4179" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4179" ref_url="https://www.suse.com/security/cve/CVE-2016-4179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4179/">CVE-2016-4179</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4180" ref_url="https://www.suse.com/security/cve/CVE-2016-4180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4180/">CVE-2016-4180</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4181" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4181" ref_url="https://www.suse.com/security/cve/CVE-2016-4181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4181/">CVE-2016-4181</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4182" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4182" ref_url="https://www.suse.com/security/cve/CVE-2016-4182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4182/">CVE-2016-4182</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4183" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4183" ref_url="https://www.suse.com/security/cve/CVE-2016-4183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4183/">CVE-2016-4183</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4184" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4184" ref_url="https://www.suse.com/security/cve/CVE-2016-4184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4184/">CVE-2016-4184</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4185" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4185" ref_url="https://www.suse.com/security/cve/CVE-2016-4185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4185/">CVE-2016-4185</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4186" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4186" ref_url="https://www.suse.com/security/cve/CVE-2016-4186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4186/">CVE-2016-4186</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4187" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4187" ref_url="https://www.suse.com/security/cve/CVE-2016-4187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4187/">CVE-2016-4187</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4188" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4188" ref_url="https://www.suse.com/security/cve/CVE-2016-4188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4188/">CVE-2016-4188</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4189" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4189" ref_url="https://www.suse.com/security/cve/CVE-2016-4189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4189/">CVE-2016-4189</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4190" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4190" ref_url="https://www.suse.com/security/cve/CVE-2016-4190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4190/">CVE-2016-4190</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4217" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4217" ref_url="https://www.suse.com/security/cve/CVE-2016-4217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4217/">CVE-2016-4217</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4218" ref_url="https://www.suse.com/security/cve/CVE-2016-4218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4218/">CVE-2016-4218</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4219" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4219" ref_url="https://www.suse.com/security/cve/CVE-2016-4219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4219/">CVE-2016-4219</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4220" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4220" ref_url="https://www.suse.com/security/cve/CVE-2016-4220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4220/">CVE-2016-4220</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4221" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4221" ref_url="https://www.suse.com/security/cve/CVE-2016-4221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4221/">CVE-2016-4221</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4222" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4222" ref_url="https://www.suse.com/security/cve/CVE-2016-4222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4222/">CVE-2016-4222</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4223" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4223" ref_url="https://www.suse.com/security/cve/CVE-2016-4223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4224 and CVE-2016-4225.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4223/">CVE-2016-4223</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4224" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4224" ref_url="https://www.suse.com/security/cve/CVE-2016-4224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4223 and CVE-2016-4225.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4224/">CVE-2016-4224</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4225" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4225" ref_url="https://www.suse.com/security/cve/CVE-2016-4225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4223 and CVE-2016-4224.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4225/">CVE-2016-4225</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4226" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4226" ref_url="https://www.suse.com/security/cve/CVE-2016-4226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4226/">CVE-2016-4226</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4227" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4227" ref_url="https://www.suse.com/security/cve/CVE-2016-4227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4227/">CVE-2016-4227</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4228" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4228" ref_url="https://www.suse.com/security/cve/CVE-2016-4228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4228/">CVE-2016-4228</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4229" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4229" ref_url="https://www.suse.com/security/cve/CVE-2016-4229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4229/">CVE-2016-4229</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4230" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4230" ref_url="https://www.suse.com/security/cve/CVE-2016-4230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4231, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4230/">CVE-2016-4230</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4231" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4231" ref_url="https://www.suse.com/security/cve/CVE-2016-4231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, and CVE-2016-4248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4231/">CVE-2016-4231</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4232" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4232" ref_url="https://www.suse.com/security/cve/CVE-2016-4232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to obtain sensitive information from process memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4232/">CVE-2016-4232</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4233" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4233" ref_url="https://www.suse.com/security/cve/CVE-2016-4233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4233/">CVE-2016-4233</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4234" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4234" ref_url="https://www.suse.com/security/cve/CVE-2016-4234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4234/">CVE-2016-4234</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4235" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4235" ref_url="https://www.suse.com/security/cve/CVE-2016-4235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4235/">CVE-2016-4235</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4236" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4236" ref_url="https://www.suse.com/security/cve/CVE-2016-4236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4236/">CVE-2016-4236</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4237" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4237" ref_url="https://www.suse.com/security/cve/CVE-2016-4237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4237/">CVE-2016-4237</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4238" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4238" ref_url="https://www.suse.com/security/cve/CVE-2016-4238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4238/">CVE-2016-4238</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4239" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4239" ref_url="https://www.suse.com/security/cve/CVE-2016-4239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4239/">CVE-2016-4239</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4240" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4240" ref_url="https://www.suse.com/security/cve/CVE-2016-4240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4240/">CVE-2016-4240</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4241" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4241" ref_url="https://www.suse.com/security/cve/CVE-2016-4241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4241/">CVE-2016-4241</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4242" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4242" ref_url="https://www.suse.com/security/cve/CVE-2016-4242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4242/">CVE-2016-4242</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4243" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4243" ref_url="https://www.suse.com/security/cve/CVE-2016-4243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4243/">CVE-2016-4243</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4244" ref_url="https://www.suse.com/security/cve/CVE-2016-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4245, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4244/">CVE-2016-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4245" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4245" ref_url="https://www.suse.com/security/cve/CVE-2016-4245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, and CVE-2016-4246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4245/">CVE-2016-4245</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4246" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4246" ref_url="https://www.suse.com/security/cve/CVE-2016-4246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, and CVE-2016-4245.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4246/">CVE-2016-4246</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4247" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4247" ref_url="https://www.suse.com/security/cve/CVE-2016-4247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Race condition in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4247/">CVE-2016-4247</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4248" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4248" ref_url="https://www.suse.com/security/cve/CVE-2016-4248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, and CVE-2016-4231.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4248/">CVE-2016-4248</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4249" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4249" ref_url="https://www.suse.com/security/cve/CVE-2016-4249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4249/">CVE-2016-4249</cve>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4271" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4271" ref_url="https://www.suse.com/security/cve/CVE-2016-4271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a "local-with-filesystem Flash sandbox bypass" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4271/">CVE-2016-4271</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4272" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4272" ref_url="https://www.suse.com/security/cve/CVE-2016-4272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4272/">CVE-2016-4272</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4273" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4273" ref_url="https://www.suse.com/security/cve/CVE-2016-4273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4273/">CVE-2016-4273</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4274" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4274" ref_url="https://www.suse.com/security/cve/CVE-2016-4274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4274/">CVE-2016-4274</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4275" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4275" ref_url="https://www.suse.com/security/cve/CVE-2016-4275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4275/">CVE-2016-4275</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4276" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4276" ref_url="https://www.suse.com/security/cve/CVE-2016-4276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4276/">CVE-2016-4276</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4277" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4277" ref_url="https://www.suse.com/security/cve/CVE-2016-4277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4278.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4277/">CVE-2016-4277</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4278" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4278" ref_url="https://www.suse.com/security/cve/CVE-2016-4278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4277.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4278/">CVE-2016-4278</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4279" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4279" ref_url="https://www.suse.com/security/cve/CVE-2016-4279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4279/">CVE-2016-4279</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4280" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4280" ref_url="https://www.suse.com/security/cve/CVE-2016-4280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4280/">CVE-2016-4280</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4281" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4281" ref_url="https://www.suse.com/security/cve/CVE-2016-4281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4281/">CVE-2016-4281</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4282" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4282" ref_url="https://www.suse.com/security/cve/CVE-2016-4282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4282/">CVE-2016-4282</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4283" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4283" ref_url="https://www.suse.com/security/cve/CVE-2016-4283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4283/">CVE-2016-4283</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4284" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4284" ref_url="https://www.suse.com/security/cve/CVE-2016-4284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4284/">CVE-2016-4284</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4285" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4285" ref_url="https://www.suse.com/security/cve/CVE-2016-4285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-6922, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4285/">CVE-2016-4285</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4286" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4286" ref_url="https://www.suse.com/security/cve/CVE-2016-4286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4286/">CVE-2016-4286</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4287" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4287" ref_url="https://www.suse.com/security/cve/CVE-2016-4287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4287/">CVE-2016-4287</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4300" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<bugzilla href="https://bugzilla.suse.com/985832">SUSE bug 985832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4301" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the parse_device function in archive_read_support_format_mtree.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<bugzilla href="https://bugzilla.suse.com/985826">SUSE bug 985826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4302" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302</cve>
	<bugzilla href="https://bugzilla.suse.com/985835">SUSE bug 985835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4324" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002316.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2538-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00054.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in LibreOffice before 5.1.4 allows remote attackers to execute arbitrary code via a crafted RTF file, related to stylesheet and superscript tokens.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324</cve>
	<bugzilla href="https://bugzilla.suse.com/987553">SUSE bug 987553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516464" comment="libreoffice-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516465" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516466" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516467" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516468" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516469" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516470" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516471" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516472" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516473" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516474" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516475" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516476" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516477" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516478" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516479" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516480" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516481" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516482" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516483" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516484" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516485" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516486" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516487" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516488" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516489" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516490" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516491" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516492" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516493" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516494" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516495" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516496" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516497" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516498" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516499" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516500" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516501" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516502" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516503" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516504" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516505" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516506" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516507" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516508" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516509" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516510" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4353" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4353" ref_url="https://www.suse.com/security/cve/CVE-2016-4353" source="SUSE CVE"/>
    <description>
    ber-decoder.c in Libksba before 1.3.3 does not properly handle decoder stack overflows, which allows remote attackers to cause a denial of service (abort) via crafted BER data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4353/">CVE-2016-4353</cve>
	<bugzilla href="https://bugzilla.suse.com/977980">SUSE bug 977980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338897" comment="libksba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4354" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4354" ref_url="https://www.suse.com/security/cve/CVE-2016-4354" source="SUSE CVE"/>
    <description>
    ber-decoder.c in Libksba before 1.3.3 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (crash) via crafted BER data, which leads to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4354/">CVE-2016-4354</cve>
	<bugzilla href="https://bugzilla.suse.com/977982">SUSE bug 977982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977989">SUSE bug 977989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338897" comment="libksba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4355" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4355" ref_url="https://www.suse.com/security/cve/CVE-2016-4355" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in ber-decoder.c in Libksba before 1.3.3 allow remote attackers to cause a denial of service (crash) via crafted BER data, which leads to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4355/">CVE-2016-4355</cve>
	<bugzilla href="https://bugzilla.suse.com/977982">SUSE bug 977982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977989">SUSE bug 977989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338897" comment="libksba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4356" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4356" ref_url="https://www.suse.com/security/cve/CVE-2016-4356" source="SUSE CVE"/>
    <description>
    The append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.3 allows remote attackers to cause a denial of service (out-of-bounds read) by clearing the high bit of the byte after invalid utf-8 encoded data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4356/">CVE-2016-4356</cve>
	<bugzilla href="https://bugzilla.suse.com/977977">SUSE bug 977977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338897" comment="libksba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1779-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515479" comment="glibc-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515480" comment="glibc-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515481" comment="glibc-devel-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515482" comment="glibc-devel-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515483" comment="glibc-i18ndata-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515484" comment="glibc-locale-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515485" comment="glibc-locale-32bit-2.19-22.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515486" comment="nscd-2.19-22.16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516243" comment="glibc-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516244" comment="glibc-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516245" comment="glibc-devel-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516246" comment="glibc-devel-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516247" comment="glibc-i18ndata-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516248" comment="glibc-locale-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516249" comment="glibc-locale-32bit-2.19-38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516250" comment="nscd-2.19-38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4440" ref_url="https://www.suse.com/security/cve/CVE-2016-4440" source="SUSE CVE"/>
    <description>
    arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-12-25"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4440/">CVE-2016-4440</cve>
	<bugzilla href="https://bugzilla.suse.com/980829">SUSE bug 980829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448</cve>
	<bugzilla href="https://bugzilla.suse.com/1010299">SUSE bug 1010299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4456" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4456" ref_url="https://www.suse.com/security/cve/CVE-2016-4456" source="SUSE CVE"/>
    <description>
    The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4456/">CVE-2016-4456</cve>
	<bugzilla href="https://bugzilla.suse.com/983471">SUSE bug 983471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4463" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1808-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<bugzilla href="https://bugzilla.suse.com/985860">SUSE bug 985860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516343" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516344" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984764">SUSE bug 984764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
    <description>
    The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<bugzilla href="https://bugzilla.suse.com/1034050">SUSE bug 1034050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978445">SUSE bug 978445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization.  NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4484" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4484" ref_url="https://www.suse.com/security/cve/CVE-2016-4484" source="SUSE CVE"/>
    <description>
    The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows physically proximate attackers to gain shell access via many log in attempts with an invalid password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4484/">CVE-2016-4484</cve>
	<bugzilla href="https://bugzilla.suse.com/1009220">SUSE bug 1009220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338901" comment="dracut is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338902" comment="grub2 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557</cve>
	<bugzilla href="https://bugzilla.suse.com/979018">SUSE bug 979018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979077">SUSE bug 979077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4558" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558" source="SUSE CVE"/>
    <description>
    The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558</cve>
	<bugzilla href="https://bugzilla.suse.com/979019">SUSE bug 979019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4562" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certain vertices integer data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983309">SUSE bug 983309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4563" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles the relationship between the BezierQuantum value and certain strokes data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4564" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DrawImage function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in attempting to locate the next token, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980363">SUSE bug 980363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980883">SUSE bug 980883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4568" ref_url="https://www.suse.com/security/cve/CVE-2016-4568" source="SUSE CVE"/>
    <description>
    drivers/media/v4l2-core/videobuf2-v4l2.c in the Linux kernel before 4.5.3 allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a crafted number of planes in a VIDIOC_DQBUF ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4568/">CVE-2016-4568</cve>
	<bugzilla href="https://bugzilla.suse.com/979022">SUSE bug 979022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981516">SUSE bug 981516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1370-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<bugzilla href="https://bugzilla.suse.com/1135436">SUSE bug 1135436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516069" comment="libksba8-1.3.0-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html" source="SUSE-SU"/>
    <description>
    Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<bugzilla href="https://bugzilla.suse.com/1135436">SUSE bug 1135436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516069" comment="libksba8-1.3.0-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4581" ref_url="https://www.suse.com/security/cve/CVE-2016-4581" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4581/">CVE-2016-4581</cve>
	<bugzilla href="https://bugzilla.suse.com/979913">SUSE bug 979913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4590" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590" source="SUSE CVE"/>
    <description>
    WebKit in Apple iOS before 9.3.3 and Safari before 9.1.2 mishandles about: URLs, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142138" comment="libwebkit2gtk3-lang-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4591" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591" source="SUSE CVE"/>
    <description>
    WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 mishandles the location variable, which allows remote attackers to access the local filesystem via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142138" comment="libwebkit2gtk3-lang-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4612" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4612" ref_url="https://www.suse.com/security/cve/CVE-2016-4612" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-1683.  Reason: This candidate is a reservation duplicate of CVE-2016-1683.  Notes: All CVE users should reference CVE-2016-1683 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-15"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4612/">CVE-2016-4612</cve>
	<bugzilla href="https://bugzilla.suse.com/1135231">SUSE bug 1135231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135233">SUSE bug 1135233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135235">SUSE bug 1135235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135238">SUSE bug 1135238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4619" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4619" ref_url="https://www.suse.com/security/cve/CVE-2016-4619" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2015-8317.  Reason: This candidate is a reservation duplicate of CVE-2015-8317.  Notes: All CVE users should reference CVE-2015-8317 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4619/">CVE-2016-4619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622" source="SUSE CVE"/>
    <description>
    WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4589, CVE-2016-4623, and CVE-2016-4624.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142138" comment="libwebkit2gtk3-lang-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624" source="SUSE CVE"/>
    <description>
    WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4589, CVE-2016-4622, and CVE-2016-4623.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142138" comment="libwebkit2gtk3-lang-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html" source="SUSE-SU"/>
    <description>
    xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516593" comment="libxml2-2-2.9.1-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516594" comment="libxml2-2-32bit-2.9.1-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516595" comment="libxml2-tools-2.9.1-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516596" comment="python-libxml2-2.9.1-26.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518369" comment="libxml2-2-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518370" comment="libxml2-2-32bit-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518371" comment="libxml2-tools-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518372" comment="python-libxml2-2.9.4-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4738" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155536" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155537" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155538" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517365" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517366" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517367" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4743" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794</cve>
	<bugzilla href="https://bugzilla.suse.com/980265">SUSE bug 980265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981517">SUSE bug 981517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
    <description>
    Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for CVE-2014-7947.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797</cve>
	<bugzilla href="https://bugzilla.suse.com/979911">SUSE bug 979911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4802" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4802" ref_url="https://www.suse.com/security/cve/CVE-2016-4802" source="SUSE CVE"/>
    <description>
    Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4802/">CVE-2016-4802</cve>
	<bugzilla href="https://bugzilla.suse.com/986656">SUSE bug 986656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4804" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002225.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1461-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00014.html" source="SUSE-SU"/>
    <description>
    The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516341" comment="dosfstools-3.0.26-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2712-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00005.html" source="SUSE-SU"/>
    <description>
    The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<bugzilla href="https://bugzilla.suse.com/1074356">SUSE bug 1074356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980722">SUSE bug 980722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131298" comment="openslp-2.0.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131299" comment="openslp-32bit-2.0.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512581" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512582" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516602" comment="openslp-2.0.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516603" comment="openslp-32bit-2.0.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519172" comment="openslp-2.0.0-18.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519173" comment="openslp-32bit-2.0.0-18.2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-12-25"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913</cve>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951</cve>
	<bugzilla href="https://bugzilla.suse.com/981058">SUSE bug 981058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<bugzilla href="https://bugzilla.suse.com/981266">SUSE bug 981266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981276">SUSE bug 981276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517023" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517024" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517023" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517024" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517023" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517024" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517023" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517024" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517023" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517024" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4962" ref_url="https://www.suse.com/security/cve/CVE-2016-4962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4962/">CVE-2016-4962</cve>
	<bugzilla href="https://bugzilla.suse.com/979620">SUSE bug 979620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4963" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4963" ref_url="https://www.suse.com/security/cve/CVE-2016-4963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4963/">CVE-2016-4963</cve>
	<bugzilla href="https://bugzilla.suse.com/979641">SUSE bug 979641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979670">SUSE bug 979670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964" source="SUSE CVE"/>
    <description>
    The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s-&gt;state.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<bugzilla href="https://bugzilla.suse.com/981399">SUSE bug 981399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981401">SUSE bug 981401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00041.html" source="SUSE-SU"/>
    <description>
    GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<bugzilla href="https://bugzilla.suse.com/1023231">SUSE bug 1023231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516356" comment="wget-1.14-10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4973" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4973" ref_url="https://www.suse.com/security/cve/CVE-2016-4973" source="SUSE CVE"/>
    <description>
    Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4973/">CVE-2016-4973</cve>
	<bugzilla href="https://bugzilla.suse.com/994170">SUSE bug 994170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334154" comment="gcc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334156" comment="gcc48 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338910" comment="gcc5 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1727-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994</cve>
	<bugzilla href="https://bugzilla.suse.com/986021">SUSE bug 986021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516267" comment="gimp-2.8.10-7.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516268" comment="gimp-lang-2.8.10-7.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516269" comment="gimp-plugins-python-2.8.10-7.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516270" comment="libgimp-2_0-0-2.8.10-7.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516271" comment="libgimpui-2_0-0-2.8.10-7.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2659-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017773" ref_url="https://www.suse.com/support/kb/doc/?id=7017773" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986377">SUSE bug 986377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515470" comment="kernel-default-3.12.60-52.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515471" comment="kernel-default-devel-3.12.60-52.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515472" comment="kernel-default-extra-3.12.60-52.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515473" comment="kernel-devel-3.12.60-52.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515474" comment="kernel-macros-3.12.60-52.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515475" comment="kernel-source-3.12.60-52.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515476" comment="kernel-syms-3.12.60-52.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515477" comment="kernel-xen-3.12.60-52.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515478" comment="kernel-xen-devel-3.12.60-52.54.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4998" ref_url="https://www.suse.com/security/cve/CVE-2016-4998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017773" ref_url="https://www.suse.com/support/kb/doc/?id=7017773" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4998/">CVE-2016-4998</cve>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1809-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1975-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00024.html" source="SUSE-SU"/>
    <description>
    libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008</cve>
	<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516276" comment="libvirt-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516277" comment="libvirt-client-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516278" comment="libvirt-client-32bit-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516279" comment="libvirt-daemon-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516280" comment="libvirt-daemon-config-network-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516281" comment="libvirt-daemon-config-nwfilter-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516282" comment="libvirt-daemon-driver-interface-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516283" comment="libvirt-daemon-driver-libxl-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516284" comment="libvirt-daemon-driver-lxc-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516285" comment="libvirt-daemon-driver-network-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516286" comment="libvirt-daemon-driver-nodedev-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516287" comment="libvirt-daemon-driver-nwfilter-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516288" comment="libvirt-daemon-driver-qemu-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516289" comment="libvirt-daemon-driver-secret-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516290" comment="libvirt-daemon-driver-storage-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516291" comment="libvirt-daemon-lxc-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516292" comment="libvirt-daemon-qemu-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516293" comment="libvirt-daemon-xen-1.2.18.4-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516294" comment="libvirt-doc-1.2.18.4-11.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5009" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5009" ref_url="https://www.suse.com/security/cve/CVE-2016-5009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3201-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00126.html" source="SUSE-SU"/>
    <description>
    The handle_command function in mon/Monitor.cc in Ceph allows remote authenticated users to cause a denial of service (segmentation fault and ceph monitor crash) via an (1) empty or (2) crafted prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5009/">CVE-2016-5009</cve>
	<bugzilla href="https://bugzilla.suse.com/987144">SUSE bug 987144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518299" comment="ceph-common-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518300" comment="libcephfs1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518301" comment="librados2-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518302" comment="libradosstriper1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518303" comment="librbd1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518304" comment="python-cephfs-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518305" comment="python-rados-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518306" comment="python-rbd-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5010" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5010" ref_url="https://www.suse.com/security/cve/CVE-2016-5010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2148-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00100.html" source="SUSE-SU"/>
    <description>
    coders/tiff.c in ImageMagick before 6.9.5-3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5010/">CVE-2016-5010</cve>
	<bugzilla href="https://bugzilla.suse.com/991444">SUSE bug 991444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516295" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516296" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516297" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516298" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516299" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2840-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00078.html" source="SUSE-SU"/>
    <description>
    The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<bugzilla href="https://bugzilla.suse.com/988361">SUSE bug 988361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159070" comment="libblkid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159071" comment="libblkid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159072" comment="libfdisk1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159073" comment="libmount1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159074" comment="libmount1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159075" comment="libsmartcols1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159649" comment="libuuid-devel-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159076" comment="libuuid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159077" comment="libuuid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159078" comment="python-libmount-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159079" comment="util-linux-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159080" comment="util-linux-lang-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159081" comment="util-linux-systemd-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159082" comment="uuidd-2.29.2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512244" comment="libblkid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512245" comment="libblkid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512246" comment="libfdisk1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512247" comment="libmount1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512248" comment="libmount1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512249" comment="libsmartcols1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512250" comment="libuuid-devel-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512251" comment="libuuid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512252" comment="libuuid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512253" comment="python-libmount-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512254" comment="util-linux-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512255" comment="util-linux-lang-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512256" comment="util-linux-systemd-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512257" comment="uuidd-2.29.2-7.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516621" comment="libblkid1-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516622" comment="libblkid1-32bit-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516623" comment="libmount1-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516624" comment="libmount1-32bit-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516625" comment="libsmartcols1-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516626" comment="libuuid-devel-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516627" comment="libuuid1-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516628" comment="libuuid1-32bit-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516629" comment="python-libmount-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516630" comment="util-linux-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516631" comment="util-linux-lang-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516632" comment="util-linux-systemd-2.25-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516633" comment="uuidd-2.25-37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517514" comment="libblkid1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517515" comment="libblkid1-32bit-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517516" comment="libfdisk1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517517" comment="libmount1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517518" comment="libmount1-32bit-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517519" comment="libsmartcols1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517520" comment="libuuid-devel-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517521" comment="libuuid1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517522" comment="libuuid1-32bit-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517523" comment="python-libmount-2.28-42.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517524" comment="util-linux-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517525" comment="util-linux-lang-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517526" comment="util-linux-systemd-2.28-42.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517527" comment="uuidd-2.28-42.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00108.html" source="SUSE-SU"/>
    <description>
    The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093</cve>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00108.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094</cve>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00108.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095</cve>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00108.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096</cve>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the readgifimage function in gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (segmentation fault) via a crafted gif file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102</cve>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522397" comment="libtiff5-4.0.9-44.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522398" comment="libtiff5-32bit-4.0.9-44.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5104" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00029.html" source="SUSE-SU"/>
    <description>
    The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<bugzilla href="https://bugzilla.suse.com/982014">SUSE bug 982014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009142127" comment="imobiledevice-tools-1.2.0-7.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140975" comment="libusbmuxd4-1.0.10-2.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516119" comment="libimobiledevice-tools-1.1.5-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516120" comment="libimobiledevice4-1.1.5-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516121" comment="libusbmuxd2-1.0.8-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516122" comment="usbmuxd-1.0.8-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982024">SUSE bug 982024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982025">SUSE bug 982025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982026">SUSE bug 982026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1516-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<bugzilla href="https://bugzilla.suse.com/982176">SUSE bug 982176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516366" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516367" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1522-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1653-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516090" comment="ImageMagick-6.8.8.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516091" comment="libMagick++-6_Q16-3-6.8.8.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516092" comment="libMagickCore-6_Q16-1-6.8.8.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516093" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516094" comment="libMagickWand-6_Q16-1-6.8.8.1-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1918-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989901">SUSE bug 989901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518877" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518878" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518879" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518880" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002530.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2752-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0082-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00055.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009146003" comment="libcares2-1.9.1-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009146004" comment="libcares2-32bit-1.9.1-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512258" comment="libcares2-1.9.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512259" comment="libcares2-32bit-1.9.1-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516824" comment="libcares2-1.9.1-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516825" comment="libcares2-32bit-1.9.1-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2657-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2659-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="TID7018178" ref_url="https://www.suse.com/support/kb/doc/?id=7018178" source="SUSE-SU"/>
		<reference ref_id="TID7018287" ref_url="https://www.suse.com/support/kb/doc/?id=7018287" source="SUSE-SU"/>
		<reference ref_id="TID7022455" ref_url="https://www.suse.com/support/kb/doc/?id=7022455" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
    <description>
    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004419">SUSE bug 1004419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004436">SUSE bug 1004436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006323">SUSE bug 1006323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006695">SUSE bug 1006695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008110">SUSE bug 1008110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030118">SUSE bug 1030118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516575" comment="kernel-default-3.12.62-60.64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516576" comment="kernel-default-devel-3.12.62-60.64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516577" comment="kernel-default-extra-3.12.62-60.64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516578" comment="kernel-devel-3.12.62-60.64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516579" comment="kernel-macros-3.12.62-60.64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516580" comment="kernel-source-3.12.62-60.64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516581" comment="kernel-syms-3.12.62-60.64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516582" comment="kernel-xen-3.12.62-60.64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516583" comment="kernel-xen-devel-3.12.62-60.64.8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5239" ref_url="https://www.suse.com/security/cve/CVE-2016-5239" source="SUSE CVE"/>
    <description>
    The gnuplot delegate functionality in ImageMagick before 6.9.4-0 and GraphicsMagick allows remote attackers to execute arbitrary commands via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5239/">CVE-2016-5239</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983539">SUSE bug 983539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5241" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5241" ref_url="https://www.suse.com/security/cve/CVE-2016-5241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    magick/render.c in GraphicsMagick before 1.3.24 allows remote attackers to cause a denial of service (arithmetic exception and application crash) via a crafted svg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5241/">CVE-2016-5241</cve>
	<bugzilla href="https://bugzilla.suse.com/983455">SUSE bug 983455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5242" ref_url="https://www.suse.com/security/cve/CVE-2016-5242" source="SUSE CVE"/>
    <description>
    The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding references to them, related to VMID exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5242/">CVE-2016-5242</cve>
	<bugzilla href="https://bugzilla.suse.com/983300">SUSE bug 983300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5243" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
    <description>
    The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243</cve>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0, Firefox ESR &lt; 45.4 and Thunderbird &lt; 45.4 allow remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4 and Thunderbird &lt; 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 and Firefox ESR &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox="allow-scripts" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    The nsImageGeometryMixin class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via bidirectional text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
    <description>
    A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5287" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5287" ref_url="https://www.suse.com/security/cve/CVE-2016-5287" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2735-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A potentially exploitable use-after-free crash during actor destruction with service workers. This issue does not affect releases earlier than Firefox 49. This vulnerability affects Firefox &lt; 49.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5287/">CVE-2016-5287</cve>
	<bugzilla href="https://bugzilla.suse.com/1006475">SUSE bug 1006475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5288" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5288" ref_url="https://www.suse.com/security/cve/CVE-2016-5288" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2735-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00015.html" source="SUSE-SU"/>
    <description>
    Web content could access information in the HTTP cache if e10s is disabled. This can reveal some visited URLs and the contents of those pages. This issue affects Firefox 48 and 49. This vulnerability affects Firefox &lt; 49.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5288/">CVE-2016-5288</cve>
	<bugzilla href="https://bugzilla.suse.com/1006476">SUSE bug 1006476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5289" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 49. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5292" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    During URL parsing, a maliciously crafted URL can cause a potentially exploitable crash. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5293" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5293" ref_url="https://www.suse.com/security/cve/CVE-2016-5293" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    When the Mozilla Updater is run, if the Updater's log file in the working directory points to a hardlink, data can be appended to an arbitrary local file. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5293/">CVE-2016-5293</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010400">SUSE bug 1010400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5294" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5294" ref_url="https://www.suse.com/security/cve/CVE-2016-5294" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    The Mozilla Updater can be made to choose an arbitrary target working directory for output files resulting from the update process. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5294/">CVE-2016-5294</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010396">SUSE bug 1010396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5295" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5295" ref_url="https://www.suse.com/security/cve/CVE-2016-5295" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    This vulnerability allows an attacker to use the Mozilla Maintenance Service to escalate privilege by having the Maintenance Service invoke the Mozilla Updater to run malicious local files. This vulnerability requires local system access and is a variant of MFSA2013-44. Note: this issue only affects Windows operating systems. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5295/">CVE-2016-5295</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010411">SUSE bug 1010411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5298" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5298" ref_url="https://www.suse.com/security/cve/CVE-2016-5298" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A mechanism where disruption of the loading of a new web page can cause the previous page's favicon and SSL indicator to not be reset when the new page is loaded. Note: this issue only affects Firefox for Android. Desktop Firefox is unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5298/">CVE-2016-5298</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010412">SUSE bug 1010412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5299" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5299" ref_url="https://www.suse.com/security/cve/CVE-2016-5299" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A previously installed malicious Android application with same signature-level permissions as Firefox can intercept AuthTokens meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5299/">CVE-2016-5299</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010413">SUSE bug 1010413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00071.html" source="SUSE-SU"/>
    <description>
    The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517085" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517086" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517087" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519147" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519148" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00078.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520078" comment="libtiff5-4.0.9-44.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520079" comment="libtiff5-32bit-4.0.9-44.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<bugzilla href="https://bugzilla.suse.com/1007284">SUSE bug 1007284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<bugzilla href="https://bugzilla.suse.com/984813">SUSE bug 984813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5322" ref_url="https://www.suse.com/security/cve/CVE-2016-5322" source="SUSE CVE"/>
    <description>
    The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5322/">CVE-2016-5322</cve>
	<bugzilla href="https://bugzilla.suse.com/984816">SUSE bug 984816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<bugzilla href="https://bugzilla.suse.com/984815">SUSE bug 984815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983973">SUSE bug 983973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5350" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5351" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
    <description>
    epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5353" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5354" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5355" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5356" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5357" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5358" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5359" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 1.12.x before 1.12.12 mishandles offsets, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2272-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00036.html" source="SUSE-SU"/>
    <description>
    fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<bugzilla href="https://bugzilla.suse.com/1123116">SUSE bug 1123116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140574" comment="fontconfig-2.11.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140575" comment="fontconfig-32bit-2.11.1-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516347" comment="fontconfig-2.11.0-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516348" comment="fontconfig-32bit-2.11.0-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5389" ref_url="https://www.suse.com/security/cve/CVE-2016-5389" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5696.  Reason: This candidate is a reservation duplicate of CVE-2016-5696.  Notes: All CVE users should reference CVE-2016-5696 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5389/">CVE-2016-5389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002477.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00047.html" source="SUSE-SU"/>
    <description>
    The (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXv before 1.0.11 allow remote X servers to trigger out-of-bounds memory access operations via vectors involving length specifications in received data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123148">SUSE bug 1123148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5412" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412" source="SUSE CVE"/>
    <description>
    arch/powerpc/kvm/book3s_hv_rmhandlers.S in the Linux kernel through 4.7 on PowerPC platforms, when CONFIG_KVM_BOOK3S_64_HV is enabled, allows guest OS users to cause a denial of service (host OS infinite loop) by making a H_CEDE hypercall during the existence of a suspended transaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412</cve>
	<bugzilla href="https://bugzilla.suse.com/1013013">SUSE bug 1013013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991065">SUSE bug 991065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417" source="SUSE CVE"/>
    <description>
    Memory leak in the __res_vinit function in the IPv6 name server management code in libresolv in GNU C Library (aka glibc or libc6) before 2.24 allows remote attackers to cause a denial of service (memory consumption) by leveraging partial initialization of internal resolver data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417</cve>
	<bugzilla href="https://bugzilla.suse.com/991670">SUSE bug 991670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5418" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<bugzilla href="https://bugzilla.suse.com/998677">SUSE bug 998677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2227-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<bugzilla href="https://bugzilla.suse.com/1033413">SUSE bug 1033413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033442">SUSE bug 1033442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516419" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516420" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516421" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2227-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516419" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516420" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516421" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5421" ref_url="https://www.suse.com/security/cve/CVE-2016-5421" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2227-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5421/">CVE-2016-5421</cve>
	<bugzilla href="https://bugzilla.suse.com/991391">SUSE bug 991391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516419" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516420" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516421" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00017.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<bugzilla href="https://bugzilla.suse.com/1041981">SUSE bug 1041981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042497">SUSE bug 1042497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052683">SUSE bug 1052683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516455" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516456" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516457" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516458" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00017.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<bugzilla href="https://bugzilla.suse.com/1041981">SUSE bug 1041981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042497">SUSE bug 1042497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052683">SUSE bug 1052683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516455" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516456" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516457" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516458" comment="postgresql94-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2278-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516349" comment="libmysqlclient18-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516350" comment="libmysqlclient18-32bit-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516351" comment="libmysqlclient_r18-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516352" comment="libmysqlclient_r18-32bit-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516353" comment="mariadb-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516354" comment="mariadb-client-10.0.26-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516355" comment="mariadb-errormessages-10.0.26-9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="TID7020150" ref_url="https://www.suse.com/support/kb/doc/?id=7020150" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5549" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5556" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5582.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5573.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<bugzilla href="https://bugzilla.suse.com/1005564">SUSE bug 1005564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<bugzilla href="https://bugzilla.suse.com/1005566">SUSE bug 1005566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<bugzilla href="https://bugzilla.suse.com/1005569">SUSE bug 1005569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<bugzilla href="https://bugzilla.suse.com/1065451">SUSE bug 1065451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106262">SUSE bug 1106262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517500" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517501" comment="python3-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517502" comment="python3-base-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517503" comment="python3-curses-3.4.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159263" comment="python-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159265" comment="python-curses-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159269" comment="python-tk-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159274" comment="python3-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159275" comment="python3-curses-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512601" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512602" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516316" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516317" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516599" comment="libpython3_4m1_0-3.4.5-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516318" comment="python-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516319" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516320" comment="python-curses-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516321" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516322" comment="python-tk-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516323" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516600" comment="python3-3.4.5-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516601" comment="python3-base-3.4.5-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5687" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The VerticalFilter function in the DDS coder in ImageMagick before 6.9.4-3 and 7.x before 7.0.1-4 allows remote attackers to have unspecified impact via a crafted DDS file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5688" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
    <description>
    The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5689" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of NULL pointer checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5690" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadDCMImage function in DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact via vectors involving the for statement in computing the pixel scaling table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5691" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of validation of (1) pixel.red, (2) pixel.green, and (3) pixel.blue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985351">SUSE bug 985351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517500" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517501" comment="python3-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517502" comment="python3-base-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517503" comment="python3-curses-3.4.5-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159263" comment="python-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159265" comment="python-curses-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159269" comment="python-tk-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159274" comment="python3-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159275" comment="python3-curses-3.4.6-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512601" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512602" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516316" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516317" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516599" comment="libpython3_4m1_0-3.4.5-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516318" comment="python-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516319" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516320" comment="python-curses-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516321" comment="python-devel-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516322" comment="python-tk-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516323" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516600" comment="python3-3.4.5-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516601" comment="python3-base-3.4.5-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5728" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5728" ref_url="https://www.suse.com/security/cve/CVE-2016-5728" source="SUSE CVE"/>
    <description>
    Race condition in the vop_ioctl function in drivers/misc/mic/vop/vop_vringh.c in the MIC VOP driver in the Linux kernel before 4.6.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (memory corruption and system crash) by changing a certain header, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5728/">CVE-2016-5728</cve>
	<bugzilla href="https://bugzilla.suse.com/986827">SUSE bug 986827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5746" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2264-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00032.html" source="SUSE-SU"/>
    <description>
    libstorage, libstorage-ng, and yast-storage improperly store passphrases for encrypted storage devices in a temporary file on disk, which might allow local users to obtain sensitive information by reading the file, as demonstrated by /tmp/libstorage-XXXXXX/pwdf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746</cve>
	<bugzilla href="https://bugzilla.suse.com/984245">SUSE bug 984245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334352" comment="yast2-storage is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516345" comment="libstorage-ruby-2.25.35.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516346" comment="libstorage6-2.25.35.1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334352" comment="yast2-storage is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5759" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002337.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00083.html" source="SUSE-SU"/>
    <description>
    The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<bugzilla href="https://bugzilla.suse.com/990200">SUSE bug 990200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140694" comment="kdump-0.8.15-28.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159034" comment="kdump-0.8.16-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512196" comment="kdump-0.8.16-9.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516557" comment="kdump-0.8.15-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00074.html" source="SUSE-SU"/>
    <description>
    php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773</cve>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516680" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5823" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5823" ref_url="https://www.suse.com/security/cve/CVE-2016-5823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
    <description>
    The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5823/">CVE-2016-5823</cve>
	<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334353" comment="libical is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5824" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    libical 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159508" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159509" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334353" comment="libical is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517937" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517938" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5825" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5825" ref_url="https://www.suse.com/security/cve/CVE-2016-5825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
    <description>
    The icalparser_parse_string function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5825/">CVE-2016-5825</cve>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334353" comment="libical is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5826" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5826" ref_url="https://www.suse.com/security/cve/CVE-2016-5826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
    <description>
    The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (out-of-bounds heap read) by crafting a string to the icalparser_parse_string function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5826/">CVE-2016-5826</cve>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334353" comment="libical is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5827" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00108.html" source="SUSE-SU"/>
    <description>
    The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted string to the icalparser_parse_string function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159508" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159509" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334353" comment="libical is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517937" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517938" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828</cve>
	<bugzilla href="https://bugzilla.suse.com/986569">SUSE bug 986569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991065">SUSE bug 991065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054127">SUSE bug 1054127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986573">SUSE bug 986573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote attackers to obtain sensitive memory information via vectors involving the q variable, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5844" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<bugzilla href="https://bugzilla.suse.com/986566">SUSE bug 986566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5863" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5863" ref_url="https://www.suse.com/security/cve/CVE-2016-5863" source="SUSE CVE"/>
    <description>
    In an ioctl handler in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, several sanity checks are missing which can lead to out-of-bounds accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5863/">CVE-2016-5863</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054127">SUSE bug 1054127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<bugzilla href="https://bugzilla.suse.com/1007284">SUSE bug 1007284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2071-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00004.html" source="SUSE-SU"/>
    <description>
    The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<bugzilla href="https://bugzilla.suse.com/987580">SUSE bug 987580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991710">SUSE bug 991710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516366" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516367" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6130" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6130" ref_url="https://www.suse.com/security/cve/CVE-2016-6130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6130/">CVE-2016-6130</cve>
	<bugzilla href="https://bugzilla.suse.com/987542">SUSE bug 987542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6131" ref_url="https://www.suse.com/security/cve/CVE-2016-6131" source="SUSE CVE"/>
    <description>
    The demangler in GNU Libiberty allows remote attackers to cause a denial of service (infinite loop, stack overflow, and crash) via a cycle in the references of remembered mangled types.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6131/">CVE-2016-6131</cve>
	<bugzilla href="https://bugzilla.suse.com/1075785">SUSE bug 1075785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987552">SUSE bug 987552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987631">SUSE bug 987631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987633">SUSE bug 987633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987635">SUSE bug 987635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987637">SUSE bug 987637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987644">SUSE bug 987644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<bugzilla href="https://bugzilla.suse.com/987577">SUSE bug 987577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991436">SUSE bug 991436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995034">SUSE bug 995034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516366" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516367" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6136" ref_url="https://www.suse.com/security/cve/CVE-2016-6136" source="SUSE CVE"/>
    <description>
    Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-06"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6136/">CVE-2016-6136</cve>
	<bugzilla href="https://bugzilla.suse.com/988153">SUSE bug 988153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1932-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html" source="SUSE-SU"/>
    <description>
    os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<bugzilla href="https://bugzilla.suse.com/1149969">SUSE bug 1149969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130774" comment="libsqlite3-0-3.8.10.2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130775" comment="libsqlite3-0-32bit-3.8.10.2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130776" comment="sqlite3-3.8.10.2-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159203" comment="libsqlite3-0-3.8.10.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159204" comment="libsqlite3-0-32bit-3.8.10.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159205" comment="sqlite3-3.8.10.2-8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516264" comment="libsqlite3-0-3.8.10.2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516265" comment="libsqlite3-0-32bit-3.8.10.2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516266" comment="sqlite3-3.8.10.2-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6156" ref_url="https://www.suse.com/security/cve/CVE-2016-6156" source="SUSE CVE"/>
    <description>
    Race condition in the ec_device_ioctl_xcmd function in drivers/platform/chrome/cros_ec_dev.c in the Linux kernel before 4.7 allows local users to cause a denial of service (out-of-bounds array access) by changing a certain size value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6156/">CVE-2016-6156</cve>
	<bugzilla href="https://bugzilla.suse.com/988025">SUSE bug 988025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2071-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00004.html" source="SUSE-SU"/>
    <description>
    The output function in gd_gif_out.c in the GD Graphics Library (aka libgd) allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516366" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516367" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6162" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6162" ref_url="https://www.suse.com/security/cve/CVE-2016-6162" source="SUSE CVE"/>
    <description>
    net/core/skbuff.c in the Linux kernel 4.7-rc6 allows local users to cause a denial of service (panic) or possibly have unspecified other impact via certain IPv6 socket operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6162/">CVE-2016-6162</cve>
	<bugzilla href="https://bugzilla.suse.com/1009969">SUSE bug 1009969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988013">SUSE bug 988013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
    <description>
    ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<bugzilla href="https://bugzilla.suse.com/1028603">SUSE bug 1028603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517261" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517262" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517263" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999993">SUSE bug 999993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516357" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516358" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516359" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516360" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6187" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6187" ref_url="https://www.suse.com/security/cve/CVE-2016-6187" source="SUSE CVE"/>
    <description>
    The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6187/">CVE-2016-6187</cve>
	<bugzilla href="https://bugzilla.suse.com/988307">SUSE bug 988307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6197" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6197" ref_url="https://www.suse.com/security/cve/CVE-2016-6197" source="SUSE CVE"/>
    <description>
    fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6197/">CVE-2016-6197</cve>
	<bugzilla href="https://bugzilla.suse.com/988708">SUSE bug 988708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6198" ref_url="https://www.suse.com/security/cve/CVE-2016-6198" source="SUSE CVE"/>
    <description>
    The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6198/">CVE-2016-6198</cve>
	<bugzilla href="https://bugzilla.suse.com/988708">SUSE bug 988708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2071-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<bugzilla href="https://bugzilla.suse.com/991434">SUSE bug 991434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991622">SUSE bug 991622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516366" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516367" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00068.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516363" comment="openssh-6.6p1-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516364" comment="openssh-askpass-gnome-6.6p1-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516365" comment="openssh-helpers-6.6p1-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6213" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6213" ref_url="https://www.suse.com/security/cve/CVE-2016-6213" source="SUSE CVE"/>
    <description>
    fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6213/">CVE-2016-6213</cve>
	<bugzilla href="https://bugzilla.suse.com/988964">SUSE bug 988964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<bugzilla href="https://bugzilla.suse.com/987577">SUSE bug 987577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991436">SUSE bug 991436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995034">SUSE bug 995034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516366" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516367" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00061.html" source="SUSE-SU"/>
    <description>
    The TIFFReadRawStrip1 and TIFFReadRawTile1 functions in tif_read.c in libtiff before 4.0.7 allows remote attackers to cause a denial of service (crash) or possibly obtain sensitive information via a negative index in a file-content buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223</cve>
	<bugzilla href="https://bugzilla.suse.com/990460">SUSE bug 990460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6224" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6224" ref_url="https://www.suse.com/security/cve/CVE-2016-6224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00006.html" source="SUSE-SU"/>
    <description>
    ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6224/">CVE-2016-6224</cve>
	<bugzilla href="https://bugzilla.suse.com/989121">SUSE bug 989121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989122">SUSE bug 989122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334267" comment="ecryptfs-utils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518823" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518824" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6250" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<bugzilla href="https://bugzilla.suse.com/989980">SUSE bug 989980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1997-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004475.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00044.html" source="SUSE-SU"/>
    <description>
    Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252</cve>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979282">SUSE bug 979282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512619" comment="shadow-4.2.1-27.19.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519796" comment="shadow-4.2.1-27.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988692">SUSE bug 988692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6259" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<bugzilla href="https://bugzilla.suse.com/988676">SUSE bug 988676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988694">SUSE bug 988694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
    <description>
    The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174162" comment="libidn11-1.28-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174163" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516300" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516301" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
    <description>
    idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<bugzilla href="https://bugzilla.suse.com/1014473">SUSE bug 1014473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190777">SUSE bug 1190777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174162" comment="libidn11-1.28-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174163" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516300" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516301" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
    <description>
    The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174162" comment="libidn11-1.28-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174163" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516300" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516301" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6294" ref_url="https://www.suse.com/security/cve/CVE-2016-6294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002994.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1757-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1800-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00029.html" source="SUSE-SU"/>
    <description>
    The locale_accept_from_http function in ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6294/">CVE-2016-6294</cve>
	<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334242" comment="icu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<bugzilla href="https://bugzilla.suse.com/1001706">SUSE bug 1001706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005579">SUSE bug 1005579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021375">SUSE bug 1021375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6305" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6305" ref_url="https://www.suse.com/security/cve/CVE-2016-6305" source="SUSE CVE"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
    <description>
    The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6305/">CVE-2016-6305</cve>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999667">SUSE bug 999667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6307" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6307" ref_url="https://www.suse.com/security/cve/CVE-2016-6307" source="SUSE CVE"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
    <description>
    The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6307/">CVE-2016-6307</cve>
	<bugzilla href="https://bugzilla.suse.com/1001143">SUSE bug 1001143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999669">SUSE bug 999669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999670">SUSE bug 999670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6308" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6308" ref_url="https://www.suse.com/security/cve/CVE-2016-6308" source="SUSE CVE"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
    <description>
    statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6308/">CVE-2016-6308</cve>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999670">SUSE bug 999670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6309" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6309" ref_url="https://www.suse.com/security/cve/CVE-2016-6309" source="SUSE CVE"/>
    <description>
    statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-6309/">CVE-2016-6309</cve>
	<bugzilla href="https://bugzilla.suse.com/1001143">SUSE bug 1001143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00108.html" source="SUSE-SU"/>
    <description>
    The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156955" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156956" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512320" comment="libgcrypt20-1.6.1-16.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512321" comment="libgcrypt20-32bit-1.6.1-16.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516422" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516423" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<bugzilla href="https://bugzilla.suse.com/1123113">SUSE bug 1123113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130930" comment="cracklib-2.9.0-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131013" comment="libcrack2-2.9.0-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131014" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516333" comment="cracklib-2.9.0-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516334" comment="libcrack2-2.9.0-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516335" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2874-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3003-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123796">SUSE bug 1123796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159313" comment="tar-1.27.1-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159314" comment="tar-lang-1.27.1-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512622" comment="tar-1.27.1-15.3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512623" comment="tar-lang-1.27.1-15.3.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516650" comment="tar-1.27.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516651" comment="tar-lang-1.27.1-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2443-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00009.html" source="SUSE-SU"/>
    <description>
    The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323</cve>
	<bugzilla href="https://bugzilla.suse.com/994359">SUSE bug 994359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6327" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6327" ref_url="https://www.suse.com/security/cve/CVE-2016-6327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6327/">CVE-2016-6327</cve>
	<bugzilla href="https://bugzilla.suse.com/994748">SUSE bug 994748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6328" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518774" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518775" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6329" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00077.html" source="SUSE-SU"/>
    <description>
    OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<bugzilla href="https://bugzilla.suse.com/1026864">SUSE bug 1026864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518753" comment="openvpn-2.3.8-16.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6349" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6349" ref_url="https://www.suse.com/security/cve/CVE-2016-6349" source="SUSE CVE"/>
    <description>
    The machinectl command in oci-register-machine allows local users to list running containers and possibly obtain sensitive information by running that command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6349/">CVE-2016-6349</cve>
	<bugzilla href="https://bugzilla.suse.com/990805">SUSE bug 990805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<bugzilla href="https://bugzilla.suse.com/990835">SUSE bug 990835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002333.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00040.html" source="SUSE-SU"/>
    <description>
    The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333993" comment="gtk2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158993" comment="gdk-pixbuf-lang-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158994" comment="gdk-pixbuf-query-loaders-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158995" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158996" comment="libgdk_pixbuf-2_0-0-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158997" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158998" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2167-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2182-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<bugzilla href="https://bugzilla.suse.com/1026047">SUSE bug 1026047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131107" comment="at-3.1.14-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131108" comment="bogofilter-1.2.4-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131109" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131110" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131114" comment="libkde4-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131115" comment="libkde4-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131116" comment="libkdecore4-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131117" comment="libkdecore4-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131118" comment="libksuseinstall1-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131119" comment="libksuseinstall1-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131120" comment="libnetpbm11-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131121" comment="libnetpbm11-32bit-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131122" comment="netpbm-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131123" comment="openslp-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131124" comment="openslp-32bit-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131107" comment="at-3.1.14-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131108" comment="bogofilter-1.2.4-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131109" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131110" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155614" comment="libkde4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155615" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155616" comment="libkdecore4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155617" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155618" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155619" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139268" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156953" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139269" comment="netpbm-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131298" comment="openslp-2.0.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131299" comment="openslp-32bit-2.0.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512029" comment="at-3.1.14-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131108" comment="bogofilter-1.2.4-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512030" comment="libQtWebKit4-4.8.7+2.3.4-4.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512031" comment="libQtWebKit4-32bit-4.8.7+2.3.4-4.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155614" comment="libkde4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155615" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155616" comment="libkdecore4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155617" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155618" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155619" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139268" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156953" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139269" comment="netpbm-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512581" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512582" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516424" comment="at-3.1.14-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516425" comment="bogofilter-1.2.4-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516426" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516427" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516428" comment="libbonobo-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516429" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516430" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516431" comment="libkde4-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516432" comment="libkde4-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516433" comment="libkdecore4-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516434" comment="libkdecore4-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516435" comment="libksuseinstall1-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516436" comment="libksuseinstall1-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516437" comment="libnetpbm11-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516438" comment="libnetpbm11-32bit-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516439" comment="netpbm-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516440" comment="openslp-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516441" comment="openslp-32bit-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991667">SUSE bug 991667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992568">SUSE bug 992568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1533-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489</cve>
	<bugzilla href="https://bugzilla.suse.com/991464">SUSE bug 991464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156348" comment="libhogweed2-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156349" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156351" comment="libnettle4-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156352" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518701" comment="libhogweed2-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518702" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518703" comment="libnettle4-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518704" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993854">SUSE bug 993854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6491" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2148-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00100.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the Get8BIMProperty function in MagickCore/property.c in ImageMagick before 6.9.5-4 and 7.x before 7.0.2-6 allows remote attackers to cause a denial of service (out-of-bounds read, memory leak, and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516295" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516296" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516297" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516298" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516299" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6503" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6503" ref_url="https://www.suse.com/security/cve/CVE-2016-6503" source="SUSE CVE"/>
    <description>
    The CORBA IDL dissectors in Wireshark 2.x before 2.0.5 on 64-bit Windows platforms do not properly interact with Visual C++ compiler options, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6503/">CVE-2016-6503</cve>
	<bugzilla href="https://bugzilla.suse.com/991011">SUSE bug 991011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6504" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1.12.x before 1.12.13 does not properly maintain a ptvc data structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6506" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6508" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6509" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6510" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6511" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6512" ref_url="https://www.suse.com/security/cve/CVE-2016-6512" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits an overflow check in the tvb_get_guintvar function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet, related to the MMSE, WAP, WBXML, and WSP dissectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6512/">CVE-2016-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/991021">SUSE bug 991021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6513" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6513" ref_url="https://www.suse.com/security/cve/CVE-2016-6513" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 2.x before 2.0.5 does not restrict the recursion depth, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6513/">CVE-2016-6513</cve>
	<bugzilla href="https://bugzilla.suse.com/991022">SUSE bug 991022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00068.html" source="SUSE-SU"/>
    <description>
    The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516363" comment="openssh-6.6p1-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516364" comment="openssh-askpass-gnome-6.6p1-52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516365" comment="openssh-helpers-6.6p1-52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6516" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6516" ref_url="https://www.suse.com/security/cve/CVE-2016-6516" source="SUSE CVE"/>
    <description>
    Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6516/">CVE-2016-6516</cve>
	<bugzilla href="https://bugzilla.suse.com/991604">SUSE bug 991604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991669">SUSE bug 991669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6520" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2148-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00100.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in MagickCore/enhance.c in ImageMagick before 7.0.2-7 allows remote attackers to have unspecified impact via vectors related to pixel cache morphology.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516295" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516296" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516297" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516298" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516299" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516445" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516446" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516447" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516448" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516449" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516450" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516451" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
    <description>
    mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6786" ref_url="https://www.suse.com/security/cve/CVE-2016-6786" source="SUSE CVE"/>
    <description>
    kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 30955111.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6786/">CVE-2016-6786</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025626">SUSE bug 1025626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6787" ref_url="https://www.suse.com/security/cve/CVE-2016-6787" source="SUSE CVE"/>
    <description>
    kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 31095224.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6787/">CVE-2016-6787</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6823" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3089-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3091-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00072.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002207">SUSE bug 1002207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516673" comment="ImageMagick-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516674" comment="libMagick++-6_Q16-3-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516675" comment="libMagickCore-6_Q16-1-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516676" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516677" comment="libMagickWand-6_Q16-1-6.8.8.1-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<bugzilla href="https://bugzilla.suse.com/994774">SUSE bug 994774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994775">SUSE bug 994775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6834" ref_url="https://www.suse.com/security/cve/CVE-2016-6834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6834/">CVE-2016-6834</cve>
	<bugzilla href="https://bugzilla.suse.com/994418">SUSE bug 994418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994421">SUSE bug 994421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6835" ref_url="https://www.suse.com/security/cve/CVE-2016-6835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6835/">CVE-2016-6835</cve>
	<bugzilla href="https://bugzilla.suse.com/994605">SUSE bug 994605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994625">SUSE bug 994625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<bugzilla href="https://bugzilla.suse.com/994760">SUSE bug 994760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994761">SUSE bug 994761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6855" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002405.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2242-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x before 3.20.4, when used with glib before 2.44.1, allow remote attackers to cause a denial of service (out-of-bounds write and crash) via vectors involving passing invalid UTF-8 to GMarkup.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<bugzilla href="https://bugzilla.suse.com/994819">SUSE bug 994819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516640" comment="eog-3.10.2-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516641" comment="eog-lang-3.10.2-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<bugzilla href="https://bugzilla.suse.com/994771">SUSE bug 994771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994772">SUSE bug 994772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2203-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<bugzilla href="https://bugzilla.suse.com/995034">SUSE bug 995034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516366" comment="gd-2.1.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516367" comment="gd-32bit-2.1.0-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6906" ref_url="https://www.suse.com/security/cve/CVE-2016-6906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
    <description>
    The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6906/">CVE-2016-6906</cve>
	<bugzilla href="https://bugzilla.suse.com/1022553">SUSE bug 1022553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517107" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517108" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2683-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00032.html" source="SUSE-SU"/>
    <description>
    The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516606" comment="gd-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516607" comment="gd-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the gdImageWebPtr function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via large width and height values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<bugzilla href="https://bugzilla.suse.com/1022284">SUSE bug 1022284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517107" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517108" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6921" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6921" ref_url="https://www.suse.com/security/cve/CVE-2016-6921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6921/">CVE-2016-6921</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6922" ref_url="https://www.suse.com/security/cve/CVE-2016-6922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6924.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6922/">CVE-2016-6922</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6923" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6923" ref_url="https://www.suse.com/security/cve/CVE-2016-6923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6923/">CVE-2016-6923</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6924" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6924" ref_url="https://www.suse.com/security/cve/CVE-2016-6924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6922.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6924/">CVE-2016-6924</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6925" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6925" ref_url="https://www.suse.com/security/cve/CVE-2016-6925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6925/">CVE-2016-6925</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6926" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6926" ref_url="https://www.suse.com/security/cve/CVE-2016-6926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6926/">CVE-2016-6926</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6927" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6927" ref_url="https://www.suse.com/security/cve/CVE-2016-6927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6927/">CVE-2016-6927</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6929" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6929" ref_url="https://www.suse.com/security/cve/CVE-2016-6929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6929/">CVE-2016-6929</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6930" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6930" ref_url="https://www.suse.com/security/cve/CVE-2016-6930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6931, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6930/">CVE-2016-6930</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6931" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6931" ref_url="https://www.suse.com/security/cve/CVE-2016-6931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6931/">CVE-2016-6931</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6932" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6932" ref_url="https://www.suse.com/security/cve/CVE-2016-6932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6932/">CVE-2016-6932</cve>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6981" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6981" ref_url="https://www.suse.com/security/cve/CVE-2016-6981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-6987.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6981/">CVE-2016-6981</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6982" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6982" ref_url="https://www.suse.com/security/cve/CVE-2016-6982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6982/">CVE-2016-6982</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6983" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6983" ref_url="https://www.suse.com/security/cve/CVE-2016-6983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6983/">CVE-2016-6983</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6984" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6984" ref_url="https://www.suse.com/security/cve/CVE-2016-6984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6984/">CVE-2016-6984</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6985" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6985" ref_url="https://www.suse.com/security/cve/CVE-2016-6985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6985/">CVE-2016-6985</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6986" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6986" ref_url="https://www.suse.com/security/cve/CVE-2016-6986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6989, and CVE-2016-6990.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6986/">CVE-2016-6986</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6987" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6987" ref_url="https://www.suse.com/security/cve/CVE-2016-6987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-6981.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6987/">CVE-2016-6987</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6989" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6989" ref_url="https://www.suse.com/security/cve/CVE-2016-6989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, and CVE-2016-6990.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6989/">CVE-2016-6989</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6990" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6990" ref_url="https://www.suse.com/security/cve/CVE-2016-6990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, and CVE-2016-6989.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6990/">CVE-2016-6990</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6992" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6992" ref_url="https://www.suse.com/security/cve/CVE-2016-6992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00043.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6992/">CVE-2016-6992</cve>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2983-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3004-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516652" comment="sudo-1.8.10p3-2.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517513" comment="sudo-1.8.10p3-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
    <description>
    The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039</cve>
	<bugzilla href="https://bugzilla.suse.com/1001486">SUSE bug 1001486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001487">SUSE bug 1001487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003964">SUSE bug 1003964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<bugzilla href="https://bugzilla.suse.com/1001148">SUSE bug 1001148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7053" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7053" ref_url="https://www.suse.com/security/cve/CVE-2016-7053" source="SUSE CVE"/>
    <description>
    In OpenSSL 1.1.0 before 1.1.0c, applications parsing invalid CMS structures can crash with a NULL pointer dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0 which can result in a NULL value being passed to the structure callback if an attempt is made to free certain invalid encodings. Only CHOICE structures using a callback which do not handle NULL value are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7053/">CVE-2016-7053</cve>
	<bugzilla href="https://bugzilla.suse.com/1009533">SUSE bug 1009533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7054" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7054" ref_url="https://www.suse.com/security/cve/CVE-2016-7054" source="SUSE CVE"/>
    <description>
    In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7054/">CVE-2016-7054</cve>
	<bugzilla href="https://bugzilla.suse.com/1009531">SUSE bug 1009531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<bugzilla href="https://bugzilla.suse.com/1009528">SUSE bug 1009528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518446" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518447" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518448" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518449" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0409-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0487-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517154" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517155" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517093" comment="libopenssl1_0_0-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517094" comment="libopenssl1_0_0-32bit-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517095" comment="openssl-1.0.1i-54.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517154" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517155" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2983-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3004-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516652" comment="sudo-1.8.10p3-2.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517513" comment="sudo-1.8.10p3-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7091" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7091" ref_url="https://www.suse.com/security/cve/CVE-2016-7091" source="SUSE CVE"/>
    <description>
    sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7091/">CVE-2016-7091</cve>
	<bugzilla href="https://bugzilla.suse.com/995726">SUSE bug 995726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7093" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<bugzilla href="https://bugzilla.suse.com/995789">SUSE bug 995789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="TID7018489" ref_url="https://www.suse.com/support/kb/doc/?id=7018489" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002523.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0015-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00007.html" source="SUSE-SU"/>
    <description>
    Race condition in wget 1.17 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516772" comment="wget-1.14-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7101" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002207">SUSE bug 1002207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003253">SUSE bug 1003253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057478">SUSE bug 1057478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516419" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516420" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516421" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7154" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7154" ref_url="https://www.suse.com/security/cve/CVE-2016-7154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the FIFO event channel code in Xen 4.4.x allows local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7154/">CVE-2016-7154</cve>
	<bugzilla href="https://bugzilla.suse.com/997731">SUSE bug 997731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<bugzilla href="https://bugzilla.suse.com/997858">SUSE bug 997858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<bugzilla href="https://bugzilla.suse.com/997859">SUSE bug 997859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157" source="SUSE CVE"/>
    <description>
    The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<bugzilla href="https://bugzilla.suse.com/997860">SUSE bug 997860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001152">SUSE bug 1001152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7162" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7162" ref_url="https://www.suse.com/security/cve/CVE-2016-7162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2338-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00067.html" source="SUSE-SU"/>
    <description>
    The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7162/">CVE-2016-7162</cve>
	<bugzilla href="https://bugzilla.suse.com/997822">SUSE bug 997822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338935" comment="file-roller is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997857">SUSE bug 997857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518016" comment="libopenjp2-7-2.1.0-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7176" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark 2.x before 2.0.6 calls snprintf with one of its input buffers as the output buffer, which allows remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 2.x before 2.0.6 does not ensure that memory is allocated for certain data structures, which allows remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7179" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark 2.x before 2.0.6 does not properly consider whether a string is constant, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7415" ref_url="https://www.suse.com/security/cve/CVE-2016-7415" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the Locale class in common/locid.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long locale string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7415/">CVE-2016-7415</cve>
	<bugzilla href="https://bugzilla.suse.com/999822">SUSE bug 999822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334242" comment="icu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
    <description>
    The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421</cve>
	<bugzilla href="https://bugzilla.suse.com/999661">SUSE bug 999661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<bugzilla href="https://bugzilla.suse.com/1000346">SUSE bug 1000346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423" source="SUSE CVE"/>
    <description>
    The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423</cve>
	<bugzilla href="https://bugzilla.suse.com/1000397">SUSE bug 1000397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero.  NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444</cve>
	<bugzilla href="https://bugzilla.suse.com/999646">SUSE bug 999646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517069" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517070" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517071" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2424-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2568-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00104.html" source="SUSE-SU"/>
    <description>
    convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999817">SUSE bug 999817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7446" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7446" ref_url="https://www.suse.com/security/cve/CVE-2016-7446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the MVG and SVG rendering code in GraphicsMagick 1.3.24 allows remote attackers to have unspecified impact via unknown vectors. Note: This vulnerability exists due to an incomplete patch for CVE-2016-2317.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7446/">CVE-2016-7446</cve>
	<bugzilla href="https://bugzilla.suse.com/999673">SUSE bug 999673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7447" ref_url="https://www.suse.com/security/cve/CVE-2016-7447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the EscapeParenthesis function in GraphicsMagick before 1.3.25 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7447/">CVE-2016-7447</cve>
	<bugzilla href="https://bugzilla.suse.com/999673">SUSE bug 999673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7448" ref_url="https://www.suse.com/security/cve/CVE-2016-7448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
    <description>
    The Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of service (CPU consumption or large memory allocations) via vectors involving the header information and the file size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7448/">CVE-2016-7448</cve>
	<bugzilla href="https://bugzilla.suse.com/999673">SUSE bug 999673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7449" ref_url="https://www.suse.com/security/cve/CVE-2016-7449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
    <description>
    The TIFFGetField function in coders/tiff.c in GraphicsMagick 1.3.24 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a file containing an "unterminated" string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7449/">CVE-2016-7449</cve>
	<bugzilla href="https://bugzilla.suse.com/999673">SUSE bug 999673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<bugzilla href="https://bugzilla.suse.com/1000345">SUSE bug 1000345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7513" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7513" ref_url="https://www.suse.com/security/cve/CVE-2016-7513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in magick/cache.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7513/">CVE-2016-7513</cve>
	<bugzilla href="https://bugzilla.suse.com/1000686">SUSE bug 1000686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7514" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514</cve>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7515" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7516" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7517" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    The EncodeImage function in coders/pict.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PICT file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7518" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    The ReadSUNImage function in coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518</cve>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028079">SUSE bug 1028079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7519" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7520" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7520" ref_url="https://www.suse.com/security/cve/CVE-2016-7520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted HDR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7520/">CVE-2016-7520</cve>
	<bugzilla href="https://bugzilla.suse.com/1000696">SUSE bug 1000696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7521" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7521" ref_url="https://www.suse.com/security/cve/CVE-2016-7521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7521/">CVE-2016-7521</cve>
	<bugzilla href="https://bugzilla.suse.com/1000697">SUSE bug 1000697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7522" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The ReadPSDImage function in MagickCore/locale.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7523" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523</cve>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7524" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7525" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525</cve>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7526" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526</cve>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000702">SUSE bug 1000702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7527" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000702">SUSE bug 1000702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7528" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7529" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7530" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7531" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    MagickCore/memory.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7532" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7532" ref_url="https://www.suse.com/security/cve/CVE-2016-7532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7532/">CVE-2016-7532</cve>
	<bugzilla href="https://bugzilla.suse.com/1000706">SUSE bug 1000706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7533" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7534" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7534" ref_url="https://www.suse.com/security/cve/CVE-2016-7534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    The generic decoder in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7534/">CVE-2016-7534</cve>
	<bugzilla href="https://bugzilla.suse.com/1000708">SUSE bug 1000708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7535" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535</cve>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7536" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7536" ref_url="https://www.suse.com/security/cve/CVE-2016-7536" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
    <description>
    magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7536/">CVE-2016-7536</cve>
	<bugzilla href="https://bugzilla.suse.com/1000710">SUSE bug 1000710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7537" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    MagickCore/memory.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7538" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7538" ref_url="https://www.suse.com/security/cve/CVE-2016-7538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7538/">CVE-2016-7538</cve>
	<bugzilla href="https://bugzilla.suse.com/1000712">SUSE bug 1000712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7539" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7539" ref_url="https://www.suse.com/security/cve/CVE-2016-7539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    Memory leak in AcquireVirtualMemory in ImageMagick before 7 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7539/">CVE-2016-7539</cve>
	<bugzilla href="https://bugzilla.suse.com/1000715">SUSE bug 1000715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7540" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7540" ref_url="https://www.suse.com/security/cve/CVE-2016-7540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7540/">CVE-2016-7540</cve>
	<bugzilla href="https://bugzilla.suse.com/1000394">SUSE bug 1000394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2715-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2961-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00100.html" source="SUSE-SU"/>
    <description>
    Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516642" comment="bash-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516643" comment="bash-doc-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516644" comment="bash-lang-4.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516645" comment="libreadline6-6.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516646" comment="libreadline6-32bit-6.2-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516647" comment="readline-doc-6.2-82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520998" comment="bash-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521000" comment="bash-lang-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521001" comment="libreadline6-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521002" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7567" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2712-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<bugzilla href="https://bugzilla.suse.com/1001600">SUSE bug 1001600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074356">SUSE bug 1074356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131298" comment="openslp-2.0.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131299" comment="openslp-32bit-2.0.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512581" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512582" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516602" comment="openslp-2.0.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516603" comment="openslp-32bit-2.0.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519172" comment="openslp-2.0.0-18.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519173" comment="openslp-32bit-2.0.0-18.2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7568" ref_url="https://www.suse.com/security/cve/CVE-2016-7568" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2683-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7568/">CVE-2016-7568</cve>
	<bugzilla href="https://bugzilla.suse.com/1001900">SUSE bug 1001900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516606" comment="gd-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516607" comment="gd-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7586" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7587" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7589" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7592" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component, which allows remote attackers to obtain sensitive information via crafted JavaScript prompts on a web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7599" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses HTTP redirects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a blob URL on a web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7635" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7639" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7641" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7645" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7652" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7654" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7656" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795" source="SUSE CVE"/>
    <description>
    The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795</cve>
	<bugzilla href="https://bugzilla.suse.com/1001765">SUSE bug 1001765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140954" comment="libsystemd0-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140955" comment="libsystemd0-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140956" comment="libudev1-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140957" comment="libudev1-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140958" comment="systemd-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140959" comment="systemd-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140960" comment="systemd-bash-completion-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140961" comment="systemd-sysvinit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140962" comment="udev-228-117.12 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159206" comment="libsystemd0-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159207" comment="libsystemd0-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159208" comment="libudev1-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159209" comment="libudev1-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159210" comment="systemd-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159211" comment="systemd-32bit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159212" comment="systemd-bash-completion-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159213" comment="systemd-sysvinit-228-142.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159214" comment="udev-228-142.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7796" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7796" ref_url="https://www.suse.com/security/cve/CVE-2016-7796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2522-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00030.html" source="SUSE-SU"/>
    <description>
    The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7796/">CVE-2016-7796</cve>
	<bugzilla href="https://bugzilla.suse.com/1001765">SUSE bug 1001765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516515" comment="libgudev-1_0-0-210-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516516" comment="libgudev-1_0-0-32bit-210-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516517" comment="libudev1-210-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516518" comment="libudev1-32bit-210-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516519" comment="systemd-210-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516520" comment="systemd-32bit-210-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516521" comment="systemd-bash-completion-210-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516522" comment="systemd-sysvinit-210-114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516523" comment="udev-210-114.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799</cve>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the parse8BIM function in coders/meta.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM chunk, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7837" ref_url="https://www.suse.com/security/cve/CVE-2016-7837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00069.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7837/">CVE-2016-7837</cve>
	<bugzilla href="https://bugzilla.suse.com/1026652">SUSE bug 1026652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512050" comment="bluez-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512051" comment="bluez-cups-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512052" comment="libbluetooth3-5.13-5.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519723" comment="bluez-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519724" comment="bluez-cups-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519725" comment="libbluetooth3-5.13-5.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7855" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7855" ref_url="https://www.suse.com/security/cve/CVE-2016-7855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2662-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00070.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows and OS X and before 11.2.202.643 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in October 2016.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7855/">CVE-2016-7855</cve>
	<bugzilla href="https://bugzilla.suse.com/1007098">SUSE bug 1007098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516604" comment="flash-player-11.2.202.643-146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516605" comment="flash-player-gnome-11.2.202.643-146.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7857" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7857" ref_url="https://www.suse.com/security/cve/CVE-2016-7857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7857/">CVE-2016-7857</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7858" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7858" ref_url="https://www.suse.com/security/cve/CVE-2016-7858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7858/">CVE-2016-7858</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7859" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7859" ref_url="https://www.suse.com/security/cve/CVE-2016-7859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7859/">CVE-2016-7859</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7860" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7860" ref_url="https://www.suse.com/security/cve/CVE-2016-7860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7860/">CVE-2016-7860</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7861" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7861" ref_url="https://www.suse.com/security/cve/CVE-2016-7861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7861/">CVE-2016-7861</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7862" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7862" ref_url="https://www.suse.com/security/cve/CVE-2016-7862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7862/">CVE-2016-7862</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7863" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7863" ref_url="https://www.suse.com/security/cve/CVE-2016-7863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7863/">CVE-2016-7863</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7864" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7864" ref_url="https://www.suse.com/security/cve/CVE-2016-7864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7864/">CVE-2016-7864</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7865" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7865" ref_url="https://www.suse.com/security/cve/CVE-2016-7865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7865/">CVE-2016-7865</cve>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7867" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7867" ref_url="https://www.suse.com/security/cve/CVE-2016-7867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to bookmarking in searches. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7867/">CVE-2016-7867</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7868" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7868" ref_url="https://www.suse.com/security/cve/CVE-2016-7868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to alternation functionality. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7868/">CVE-2016-7868</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7869" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7869" ref_url="https://www.suse.com/security/cve/CVE-2016-7869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to backtrack search functionality. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7869/">CVE-2016-7869</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7870" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7870" ref_url="https://www.suse.com/security/cve/CVE-2016-7870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7870/">CVE-2016-7870</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7871" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7871" ref_url="https://www.suse.com/security/cve/CVE-2016-7871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Worker class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7871/">CVE-2016-7871</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7872" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7872" ref_url="https://www.suse.com/security/cve/CVE-2016-7872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class related to objects at multiple presentation levels. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7872/">CVE-2016-7872</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7873" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7873" ref_url="https://www.suse.com/security/cve/CVE-2016-7873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7873/">CVE-2016-7873</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7874" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7874" ref_url="https://www.suse.com/security/cve/CVE-2016-7874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the NetConnection class when handling the proxy types. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7874/">CVE-2016-7874</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7875" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7875" ref_url="https://www.suse.com/security/cve/CVE-2016-7875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable integer overflow vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7875/">CVE-2016-7875</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7876" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7876" ref_url="https://www.suse.com/security/cve/CVE-2016-7876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Clipboard class related to data handling functionality. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7876/">CVE-2016-7876</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7877" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7877" ref_url="https://www.suse.com/security/cve/CVE-2016-7877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the Action Message Format serialization (AFM0). Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7877/">CVE-2016-7877</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7878" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7878" ref_url="https://www.suse.com/security/cve/CVE-2016-7878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the PSDK's MediaPlayer class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7878/">CVE-2016-7878</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7879" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7879" ref_url="https://www.suse.com/security/cve/CVE-2016-7879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the NetConnection class when handling an attached script object. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7879/">CVE-2016-7879</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7880" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7880" ref_url="https://www.suse.com/security/cve/CVE-2016-7880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability when setting the length property of an array object. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7880/">CVE-2016-7880</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7881" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7881" ref_url="https://www.suse.com/security/cve/CVE-2016-7881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class when handling conversion to an object. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7881/">CVE-2016-7881</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7890" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7890" ref_url="https://www.suse.com/security/cve/CVE-2016-7890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have security bypass vulnerability in the implementation of the same origin policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7890/">CVE-2016-7890</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7892" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7892" ref_url="https://www.suse.com/security/cve/CVE-2016-7892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3160-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the TextField class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7892/">CVE-2016-7892</cve>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<bugzilla href="https://bugzilla.suse.com/1002549">SUSE bug 1002549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911</cve>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010713">SUSE bug 1010713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7912" ref_url="https://www.suse.com/security/cve/CVE-2016-7912" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the ffs_user_copy_worker function in drivers/usb/gadget/function/f_fs.c in the Linux kernel before 4.5.3 allows local users to gain privileges by accessing an I/O data structure after a certain callback call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7912/">CVE-2016-7912</cve>
	<bugzilla href="https://bugzilla.suse.com/1010480">SUSE bug 1010480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010481">SUSE bug 1010481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913</cve>
	<bugzilla href="https://bugzilla.suse.com/1010478">SUSE bug 1010478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7914" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7914" ref_url="https://www.suse.com/security/cve/CVE-2016-7914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7914/">CVE-2016-7914</cve>
	<bugzilla href="https://bugzilla.suse.com/1010475">SUSE bug 1010475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7916" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916</cve>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7917" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7917" ref_url="https://www.suse.com/security/cve/CVE-2016-7917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7917/">CVE-2016-7917</cve>
	<bugzilla href="https://bugzilla.suse.com/1010444">SUSE bug 1010444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002455.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    The XGetImage function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174752">SUSE bug 1174752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136381" comment="libX11-6-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136382" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136383" comment="libX11-data-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136384" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136385" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512231" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512232" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512233" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512234" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512235" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516695" comment="libX11-6-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516696" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516697" comment="libX11-data-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516698" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516699" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516695" comment="libX11-6-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516696" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516697" comment="libX11-data-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516698" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516699" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3059-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00056.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXi before 1.7.7 allow remote X servers to cause a denial of service (out-of-bounds memory access or infinite loop) via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134167">SUSE bug 1134167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136640" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136641" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516722" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516723" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516722" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516723" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134167">SUSE bug 1134167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009136640" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136641" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516722" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516723" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516722" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516723" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrandr before 1.5.1 allow remote X servers to trigger out-of-bounds write operations via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    X.org libXrandr before 1.5.1 allows remote X servers to trigger out-of-bounds write operations by leveraging mishandling of reply data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3036-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00050.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXrender before 0.9.10 allow remote X servers to trigger out-of-bounds write operations via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015442">SUSE bug 1015442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123146">SUSE bug 1123146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135553" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135554" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3036-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00050.html" source="SUSE-SU"/>
    <description>
    The XRenderQueryFilters function in X.org libXrender before 0.9.10 allows remote X servers to trigger out-of-bounds write operations via vectors involving filter name lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015442">SUSE bug 1015442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123146">SUSE bug 1123146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135553" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135554" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3037-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00051.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3037-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00051.html" source="SUSE-SU"/>
    <description>
    X.org libXtst before 1.2.3 allows remote X servers to cause a denial of service (infinite loop) via a reply in the (1) XRecordStartOfData, (2) XRecordEndOfData, or (3) XRecordClientDied category without a client sequence and with attached data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00045.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in X.org libXvMC before 1.0.10 allows remote X servers to have unspecified impact via an empty string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135556" comment="libXvMC1-1.0.8-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7957" ref_url="https://www.suse.com/security/cve/CVE-2016-7957" source="SUSE CVE"/>
    <description>
    In Wireshark 2.2.0, the Bluetooth L2CAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-btl2cap.c by avoiding use of a seven-byte memcmp for potentially shorter strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7957/">CVE-2016-7957</cve>
	<bugzilla href="https://bugzilla.suse.com/1033717">SUSE bug 1033717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7958" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7958" ref_url="https://www.suse.com/security/cve/CVE-2016-7958" source="SUSE CVE"/>
    <description>
    In Wireshark 2.2.0, the NCP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/CMakeLists.txt by registering this dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7958/">CVE-2016-7958</cve>
	<bugzilla href="https://bugzilla.suse.com/1033712">SUSE bug 1033712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7969" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00068.html" source="SUSE-SU"/>
    <description>
    The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142721" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516732" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970</cve>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516732" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7971" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7971" ref_url="https://www.suse.com/security/cve/CVE-2016-7971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7971/">CVE-2016-7971</cve>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516732" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7972" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00068.html" source="SUSE-SU"/>
    <description>
    The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142721" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516732" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7976" ref_url="https://www.suse.com/security/cve/CVE-2016-7976" source="SUSE CVE"/>
    <description>
    The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attackers to execute arbitrary code via crafted userparams.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7976/">CVE-2016-7976</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
    <description>
    Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095610">SUSE bug 1095610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00062.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516524" comment="ghostscript-9.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516525" comment="ghostscript-x11-9.15-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00062.html" source="SUSE-SU"/>
    <description>
    Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516524" comment="ghostscript-9.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516525" comment="ghostscript-x11-9.15-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<bugzilla href="https://bugzilla.suse.com/1003613">SUSE bug 1003613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<bugzilla href="https://bugzilla.suse.com/1003612">SUSE bug 1003612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003870">SUSE bug 1003870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (assertion failure and crash) via vectors related to a ReferenceBlob and a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<bugzilla href="https://bugzilla.suse.com/1005582">SUSE bug 1005582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8318" ref_url="https://www.suse.com/security/cve/CVE-2016-8318" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.8 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8318/">CVE-2016-8318</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020872">SUSE bug 1020872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8327" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8327" ref_url="https://www.suse.com/security/cve/CVE-2016-8327" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8327/">CVE-2016-8327</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020893">SUSE bug 1020893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8331" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
    <description>
    An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519749" comment="libtiff5-4.0.9-44.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519750" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution. For a successful attack, the target user needs to open a malicious jpeg2000 file. The jpeg2000 image file format is mostly used for embedding images inside PDF documents and the OpenJpeg library is used by a number of popular PDF renderers making PDF documents a likely attack vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332</cve>
	<bugzilla href="https://bugzilla.suse.com/1002414">SUSE bug 1002414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8399" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399</cve>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8492" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8492" ref_url="https://www.suse.com/security/cve/CVE-2016-8492" source="SUSE CVE"/>
    <description>
    The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8492/">CVE-2016-8492</cve>
	<bugzilla href="https://bugzilla.suse.com/1065013">SUSE bug 1065013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004016">SUSE bug 1004016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004021">SUSE bug 1004021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004023">SUSE bug 1004023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8601" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8601" ref_url="https://www.suse.com/security/cve/CVE-2016-8601" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue in a "generally available" software product.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8601/">CVE-2016-8601</cve>
	<bugzilla href="https://bugzilla.suse.com/1004232">SUSE bug 1004232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002392.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2710-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00003.html" source="SUSE-SU"/>
    <description>
    The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516597" comment="ghostscript-9.15-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516598" comment="ghostscript-x11-9.15-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8605" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2643-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00070.html" source="SUSE-SU"/>
    <description>
    The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.0.13. Prior versions are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148134" comment="guile-2.0.9-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148135" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148136" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517074" comment="guile-2.0.9-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517075" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517076" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8606" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8606" ref_url="https://www.suse.com/security/cve/CVE-2016-8606" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00098.html" source="SUSE-SU"/>
    <description>
    The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8606/">CVE-2016-8606</cve>
	<bugzilla href="https://bugzilla.suse.com/1004226">SUSE bug 1004226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334019" comment="guile is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0487-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00026.html" source="SUSE-SU"/>
    <description>
    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120592">SUSE bug 1120592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520405" comment="libopenssl0_9_8-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520406" comment="libopenssl0_9_8-32bit-0.9.8j-106.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520405" comment="libopenssl0_9_8-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520406" comment="libopenssl0_9_8-32bit-0.9.8j-106.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517069" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517070" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517071" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517154" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517155" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517093" comment="libopenssl1_0_0-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517094" comment="libopenssl1_0_0-32bit-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517095" comment="openssl-1.0.1i-54.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517069" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517070" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517071" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517154" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517155" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<bugzilla href="https://bugzilla.suse.com/1005640">SUSE bug 1005640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<bugzilla href="https://bugzilla.suse.com/1005643">SUSE bug 1005643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8625" ref_url="https://www.suse.com/security/cve/CVE-2016-8625" source="SUSE CVE"/>
    <description>
    curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8625/">CVE-2016-8625</cve>
	<bugzilla href="https://bugzilla.suse.com/1005649">SUSE bug 1005649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8630" ref_url="https://www.suse.com/security/cve/CVE-2016-8630" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8630/">CVE-2016-8630</cve>
	<bugzilla href="https://bugzilla.suse.com/1009222">SUSE bug 1009222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00034.html" source="SUSE-SU"/>
    <description>
    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516713" comment="kernel-default-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516714" comment="kernel-default-devel-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516715" comment="kernel-default-extra-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516716" comment="kernel-devel-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516717" comment="kernel-macros-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516718" comment="kernel-source-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516719" comment="kernel-syms-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516720" comment="kernel-xen-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516721" comment="kernel-xen-devel-3.12.67-60.64.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517528" comment="kernel-default-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517529" comment="kernel-default-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517530" comment="kernel-default-extra-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517531" comment="kernel-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517532" comment="kernel-macros-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517533" comment="kernel-source-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517534" comment="kernel-syms-4.4.21-84.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
    <description>
    It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8636" ref_url="https://www.suse.com/security/cve/CVE-2016-8636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8636/">CVE-2016-8636</cve>
	<bugzilla href="https://bugzilla.suse.com/1024908">SUSE bug 1024908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8637" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003286.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0708-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00047.html" source="SUSE-SU"/>
    <description>
    A local information disclosure issue was found in dracut before 045 when generating initramfs images with world-readable permissions when 'early cpio' is used, such as when including microcode updates. Local attacker can use this to obtain sensitive information from these files, such as encryption keys or credentials.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<bugzilla href="https://bugzilla.suse.com/1008340">SUSE bug 1008340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158969" comment="dracut-044-113.10 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512113" comment="dracut-044.1-9.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517160" comment="dracut-037-91.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518550" comment="dracut-044-108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645</cve>
	<bugzilla href="https://bugzilla.suse.com/1009969">SUSE bug 1009969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646</cve>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8650" ref_url="https://www.suse.com/security/cve/CVE-2016-8650" source="SUSE CVE"/>
    <description>
    The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8650/">CVE-2016-8650</cve>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
    <description>
    A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being allocated with too small size. jasper versions before 2.0.0 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517125" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517126" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="TID7018348" ref_url="https://www.suse.com/support/kb/doc/?id=7018348" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00034.html" source="SUSE-SU"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655</cve>
	<bugzilla href="https://bugzilla.suse.com/1012754">SUSE bug 1012754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012759">SUSE bug 1012759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013822">SUSE bug 1013822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516713" comment="kernel-default-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516714" comment="kernel-default-devel-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516715" comment="kernel-default-extra-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516716" comment="kernel-devel-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516717" comment="kernel-macros-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516718" comment="kernel-source-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516719" comment="kernel-syms-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516720" comment="kernel-xen-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516721" comment="kernel-xen-devel-3.12.67-60.64.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517528" comment="kernel-default-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517529" comment="kernel-default-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517530" comment="kernel-default-extra-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517531" comment="kernel-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517532" comment="kernel-macros-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517533" comment="kernel-source-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517534" comment="kernel-syms-4.4.21-84.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8658" ref_url="https://www.suse.com/security/cve/CVE-2016-8658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8658/">CVE-2016-8658</cve>
	<bugzilla href="https://bugzilla.suse.com/1004462">SUSE bug 1004462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8660" ref_url="https://www.suse.com/security/cve/CVE-2016-8660" source="SUSE CVE"/>
    <description>
    The XFS subsystem in the Linux kernel through 4.8.2 allows local users to cause a denial of service (fdatasync failure and system hang) by using the vfs syscall group in the trinity program, related to a "page lock order bug in the XFS seek hole/data implementation."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8660/">CVE-2016-8660</cve>
	<bugzilla href="https://bugzilla.suse.com/1004532">SUSE bug 1004532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8666" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8666" ref_url="https://www.suse.com/security/cve/CVE-2016-8666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
    <description>
    The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8666/">CVE-2016-8666</cve>
	<bugzilla href="https://bugzilla.suse.com/1001486">SUSE bug 1001486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001487">SUSE bug 1001487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003964">SUSE bug 1003964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8667" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<bugzilla href="https://bugzilla.suse.com/1004706">SUSE bug 1004706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2683-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516606" comment="gd-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516607" comment="gd-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8677" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8677" ref_url="https://www.suse.com/security/cve/CVE-2016-8677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
    <description>
    The AcquireQuantumPixels function in MagickCore/quantum.c in ImageMagick before 7.0.3-1 allows remote attackers to have unspecified impact via a crafted image file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8677/">CVE-2016-8677</cve>
	<bugzilla href="https://bugzilla.suse.com/1005328">SUSE bug 1005328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8678" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8678" ref_url="https://www.suse.com/security/cve/CVE-2016-8678" source="SUSE CVE"/>
    <description>
    The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file.  NOTE: the vendor says "This is a Q64 issue and we do not support Q64."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8678/">CVE-2016-8678</cve>
	<bugzilla href="https://bugzilla.suse.com/1005344">SUSE bug 1005344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The ReadSCTImage function in coders/sct.c in GraphicsMagick 1.3.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SCT header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The MagickMalloc function in magick/memory.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8687" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8688" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<bugzilla href="https://bugzilla.suse.com/1005076">SUSE bug 1005076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8689" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<bugzilla href="https://bugzilla.suse.com/1005072">SUSE bug 1005072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8690" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8707" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516767" comment="ImageMagick-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516768" comment="libMagick++-6_Q16-3-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516769" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516770" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516771" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00032.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests.  NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517156" comment="openssh-6.6p1-54.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517157" comment="openssh-askpass-gnome-6.6p1-54.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517158" comment="openssh-helpers-6.6p1-54.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518039" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518040" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518041" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8862" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2838-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2842-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3089-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3091-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick before 7.0.3.3 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031267">SUSE bug 1031267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516673" comment="ImageMagick-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516674" comment="libMagick++-6_Q16-3-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516675" comment="libMagickCore-6_Q16-1-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516676" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516677" comment="libMagickWand-6_Q16-1-6.8.8.1-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2697-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="TID7018224" ref_url="https://www.suse.com/support/kb/doc/?id=7018224" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00017.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020526">SUSE bug 1020526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516613" comment="bind-libs-9.9.9P1-49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516614" comment="bind-libs-32bit-9.9.9P1-49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516615" comment="bind-utils-9.9.9P1-49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8866" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3238-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick 7.0.3.3 before 7.0.3.8 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031267">SUSE bug 1031267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516767" comment="ImageMagick-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516768" comment="libMagick++-6_Q16-3-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516769" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516770" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516771" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8880" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4516. Reason: This candidate is a duplicate of CVE-2011-4516. Notes: All CVE users should reference CVE-2011-4516 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8881" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517. Notes: All CVE users should reference CVE-2011-4517 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8882" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8883" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8884" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8690.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8885" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8886" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8887" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024178">SUSE bug 1024178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9015" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015</cve>
	<bugzilla href="https://bugzilla.suse.com/1023502">SUSE bug 1023502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024540">SUSE bug 1024540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561941" comment="python-setuptools-40.6.2-4.12.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561942" comment="python3-setuptools-40.6.2-4.12.23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9042" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9061" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9061" ref_url="https://www.suse.com/security/cve/CVE-2016-9061" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A previously installed malicious Android application which defines a specific signature-level permissions used by Firefox can access API keys meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9061/">CVE-2016-9061</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010418">SUSE bug 1010418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9062" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9062" ref_url="https://www.suse.com/security/cve/CVE-2016-9062" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Private browsing mode leaves metadata information, such as URLs, for sites visited in "browser.db" and "browser.db-wal" files within the Firefox profile after the mode is exited. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9062/">CVE-2016-9062</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010419">SUSE bug 1010419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00004.html" source="SUSE-SU"/>
    <description>
    An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123115">SUSE bug 1123115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518043" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518044" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518045" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9065" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9065" ref_url="https://www.suse.com/security/cve/CVE-2016-9065" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    The location bar in Firefox for Android can be spoofed by forcing a user into fullscreen mode, blocking its exiting, and creating of a fake location bar without any user notification. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9065/">CVE-2016-9065</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010403">SUSE bug 1010403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9067" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Two use-after-free errors during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9068" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A use-after-free during web animations when working with timelines resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9069" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A use-after-free in nsINode::ReplaceOrInsertBefore during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9071" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Content Security Policy combined with HTTP to HTTPS redirection can be used by malicious server to verify whether a known site is within a user's browser history. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9072" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9072" ref_url="https://www.suse.com/security/cve/CVE-2016-9072" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    When a new Firefox profile is created on 64-bit Windows installations, the sandbox for 64-bit NPAPI plugins is not enabled by default. Note: This issue only affects 64-bit Windows. 32-bit Windows and other operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9072/">CVE-2016-9072</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010407">SUSE bug 1010407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9073" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    WebExtensions can bypass security checks to load privileged URLs and potentially escape the WebExtension sandbox. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue where WebExtensions can use the mozAddonManager API to elevate privilege due to privileged pages being allowed in the permissions list. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9076" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue where a "&lt;select&gt;" dropdown menu can be used to cover location bar content, resulting in potential spoofing attacks. This attack requires e10s to be enabled in order to function. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Canvas allows the use of the "feDisplacementMap" filter on images loaded cross-origin. The rendering by the filter is variable depending on the input pixel, allowing for timing attacks when the images are loaded from third party locations. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9078" ref_url="https://www.suse.com/security/cve/CVE-2016-9078" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Redirection from an HTTP connection to a "data:" URL assigns the referring site's origin to the "data:" URL in some circumstances. This can result in same-origin violations against a domain if it loads resources from malicious sites. Cross-origin setting of cookies has been demonstrated without the ability to read them. Note: This issue only affects Firefox 49 and 50. This vulnerability affects Firefox &lt; 50.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9078/">CVE-2016-9078</cve>
	<bugzilla href="https://bugzilla.suse.com/1012807">SUSE bug 1012807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox &lt; 50.0.2, Firefox ESR &lt; 45.5.1, and Thunderbird &lt; 45.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516724" comment="MozillaFirefox-45.5.1esr-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516725" comment="MozillaFirefox-translations-45.5.1esr-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9082" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the write_png function in cairo 1.14.6 allows remote attackers to cause a denial of service (invalid pointer dereference) via a large svg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157339" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157340" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157341" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157342" comment="libcairo2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157343" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009175342" comment="libcairo-gobject2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175343" comment="libcairo-gobject2-32bit-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175344" comment="libcairo-script-interpreter2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175345" comment="libcairo2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175346" comment="libcairo2-32bit-1.15.2-25.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517639" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517640" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517641" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517642" comment="libcairo2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517643" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083</cve>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084</cve>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9101" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024181">SUSE bug 1024181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014256">SUSE bug 1014256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014259">SUSE bug 1014259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014297">SUSE bug 1014297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034990">SUSE bug 1034990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014279">SUSE bug 1014279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014299">SUSE bug 1014299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9112" ref_url="https://www.suse.com/security/cve/CVE-2016-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9112/">CVE-2016-9112</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056396">SUSE bug 1056396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9113" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9113" ref_url="https://www.suse.com/security/cve/CVE-2016-9113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image-&gt;comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9113/">CVE-2016-9113</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9114" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9114" ref_url="https://www.suse.com/security/cve/CVE-2016-9114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image-&gt;comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9114/">CVE-2016-9114</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007740">SUSE bug 1007740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9115" ref_url="https://www.suse.com/security/cve/CVE-2016-9115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9115/">CVE-2016-9115</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007741">SUSE bug 1007741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9116" ref_url="https://www.suse.com/security/cve/CVE-2016-9116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9116/">CVE-2016-9116</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007742">SUSE bug 1007742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9117" ref_url="https://www.suse.com/security/cve/CVE-2016-9117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9117/">CVE-2016-9117</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007743">SUSE bug 1007743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9118" ref_url="https://www.suse.com/security/cve/CVE-2016-9118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Heap Buffer Overflow (WRITE of size 4) in function pnmtoimage of convert.c:1719 in OpenJPEG 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9118/">CVE-2016-9118</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9120" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9120" ref_url="https://www.suse.com/security/cve/CVE-2016-9120" source="SUSE CVE"/>
    <description>
    Race condition in the ion_ioctl function in drivers/staging/android/ion/ion.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) by calling ION_IOC_FREE on two CPUs at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-9120/">CVE-2016-9120</cve>
	<bugzilla href="https://bugzilla.suse.com/1014747">SUSE bug 1014747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00031.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517244" comment="bind-libs-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517245" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517246" comment="bind-utils-9.9.9P1-53.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9137" ref_url="https://www.suse.com/security/cve/CVE-2016-9137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2866-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00074.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9137/">CVE-2016-9137</cve>
	<bugzilla href="https://bugzilla.suse.com/1008026">SUSE bug 1008026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008029">SUSE bug 1008029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516680" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00031.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517244" comment="bind-libs-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517245" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517246" comment="bind-utils-9.9.9P1-53.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9178" ref_url="https://www.suse.com/security/cve/CVE-2016-9178" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9178/">CVE-2016-9178</cve>
	<bugzilla href="https://bugzilla.suse.com/1008650">SUSE bug 1008650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012353">SUSE bug 1012353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9191" ref_url="https://www.suse.com/security/cve/CVE-2016-9191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9191/">CVE-2016-9191</cve>
	<bugzilla href="https://bugzilla.suse.com/1008842">SUSE bug 1008842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<bugzilla href="https://bugzilla.suse.com/1010161">SUSE bug 1010161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011103">SUSE bug 1011103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9298" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9298" ref_url="https://www.suse.com/security/cve/CVE-2016-9298" source="SUSE CVE"/>
    <description>
    Heap overflow in the WaveletDenoiseImage function in MagickCore/fx.c in ImageMagick before 6.9.6-4 and 7.x before 7.0.3-6 allows remote attackers to cause a denial of service (crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9298/">CVE-2016-9298</cve>
	<bugzilla href="https://bugzilla.suse.com/1010164">SUSE bug 1010164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9312" ref_url="https://www.suse.com/security/cve/CVE-2016-9312" source="SUSE CVE"/>
    <description>
    ntpd in NTP before 4.2.8p9, when running on Windows, allows remote attackers to cause a denial of service via a large UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9312/">CVE-2016-9312</cve>
	<bugzilla href="https://bugzilla.suse.com/1011401">SUSE bug 1011401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338821" comment="ntp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9313" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9313" ref_url="https://www.suse.com/security/cve/CVE-2016-9313" source="SUSE CVE"/>
    <description>
    security/keys/big_key.c in the Linux kernel before 4.8.7 mishandles unsuccessful crypto registration in conjunction with successful key-type registration, which allows local users to cause a denial of service (NULL pointer dereference and panic) or possibly have unspecified other impact via a crafted application that uses the big_key data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9313/">CVE-2016-9313</cve>
	<bugzilla href="https://bugzilla.suse.com/1012356">SUSE bug 1012356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
    <description>
    The gdImageCreate function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (system hang) via an oversized image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517107" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517108" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005735.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118959">SUSE bug 1118959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148896">SUSE bug 1148896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517391" comment="libxml2-2-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517392" comment="libxml2-2-32bit-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517393" comment="libxml2-tools-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517394" comment="python-libxml2-2.9.1-26.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518369" comment="libxml2-2-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518370" comment="libxml2-2-32bit-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518371" comment="libxml2-tools-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518372" comment="python-libxml2-2.9.4-33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521990" comment="libxml2-2-2.9.4-46.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521991" comment="libxml2-2-32bit-2.9.4-46.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521992" comment="libxml2-tools-2.9.4-46.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521993" comment="python-libxml2-2.9.4-46.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9373" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00116.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9374" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00116.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9375" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00116.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9376" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00116.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9377" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9378" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9381" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
    <description>
    Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<bugzilla href="https://bugzilla.suse.com/1009105">SUSE bug 1009105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9387" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387" source="SUSE CVE"/>
    <description>
    Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387</cve>
	<bugzilla href="https://bugzilla.suse.com/1010960">SUSE bug 1010960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9388" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9389" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9390" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9391" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9392" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The calcstepsizes function in jpc_dec.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9393" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jpc_pi_nextrpcl function in jpc_t2cod.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9394" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9395" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517125" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517126" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9396" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00004.html" source="SUSE-SU"/>
    <description>
    The JPC_NOMINALGAIN function in jpc/jpc_t1cod.c in JasPer through 2.0.12 allows remote attackers to cause a denial of service (JPC_COX_RFT assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396</cve>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021871">SUSE bug 1021871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082397">SUSE bug 1082397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522238" comment="libjasper1-1.900.14-195.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522239" comment="libjasper1-32bit-1.900.14-195.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9398" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517125" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517126" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1402-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00082.html" source="SUSE-SU"/>
    <description>
    popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123788">SUSE bug 1123788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518626" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518627" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518628" comment="bash-lang-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518629" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518630" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518631" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9427" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9427" ref_url="https://www.suse.com/security/cve/CVE-2016-9427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3126-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9427/">CVE-2016-9427</cve>
	<bugzilla href="https://bugzilla.suse.com/1011276">SUSE bug 1011276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136646" comment="libgc1-7.2d-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516727" comment="libgc1-7.2d-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9434" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9435" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to &lt;dd&gt; tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9436" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a &lt;i&gt; tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9437" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9438" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9439" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9441" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9442" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause memory corruption in certain conditions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9443" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00031.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517244" comment="bind-libs-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517245" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517246" comment="bind-utils-9.9.9P1-53.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9445" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0075-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the vmnc decoder in the gstreamer allows remote attackers to cause a denial of service (crash) via large width and height values, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517041" comment="gstreamer-0_10-plugins-bad-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517042" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516826" comment="gstreamer-plugins-bad-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516827" comment="gstreamer-plugins-bad-lang-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517043" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517044" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516828" comment="libgstbasecamerabinsrc-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517045" comment="libgstbasevideo-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517046" comment="libgstbasevideo-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517047" comment="libgstcodecparsers-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516829" comment="libgstcodecparsers-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516831" comment="libgstmpegts-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517048" comment="libgstphotography-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517049" comment="libgstphotography-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516832" comment="libgstphotography-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517050" comment="libgstsignalprocessor-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517051" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517052" comment="libgstvdp-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517053" comment="libgstvdp-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517983" comment="gstreamer-0_10-plugins-bad-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517984" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517594" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517596" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517597" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517598" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517599" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517985" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517986" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517600" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517987" comment="libgstbasevideo-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517988" comment="libgstbasevideo-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517989" comment="libgstcodecparsers-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517601" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517602" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517603" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517990" comment="libgstphotography-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517991" comment="libgstphotography-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517604" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517992" comment="libgstsignalprocessor-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517993" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517605" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517994" comment="libgstvdp-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517995" comment="libgstvdp-0_10-23-32bit-0.10.23-22.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9446" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0075-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00048.html" source="SUSE-SU"/>
    <description>
    The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote attackers to obtain sensitive information as demonstrated by thumbnailing a simple 1 frame vmnc movie that does not draw to the allocated render canvas.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517041" comment="gstreamer-0_10-plugins-bad-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517042" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516826" comment="gstreamer-plugins-bad-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516827" comment="gstreamer-plugins-bad-lang-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517043" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517044" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516828" comment="libgstbasecamerabinsrc-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517045" comment="libgstbasevideo-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517046" comment="libgstbasevideo-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517047" comment="libgstcodecparsers-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516829" comment="libgstcodecparsers-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516831" comment="libgstmpegts-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517048" comment="libgstphotography-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517049" comment="libgstphotography-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516832" comment="libgstphotography-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517050" comment="libgstsignalprocessor-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517051" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517052" comment="libgstvdp-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517053" comment="libgstvdp-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517983" comment="gstreamer-0_10-plugins-bad-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517984" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517594" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517596" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517597" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517598" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517599" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517985" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517986" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517600" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517987" comment="libgstbasevideo-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517988" comment="libgstbasevideo-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517989" comment="libgstcodecparsers-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517601" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517602" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517603" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517990" comment="libgstphotography-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517991" comment="libgstphotography-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517604" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517992" comment="libgstsignalprocessor-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517993" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517605" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517994" comment="libgstvdp-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517995" comment="libgstvdp-0_10-23-32bit-0.10.23-22.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9447" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9447" ref_url="https://www.suse.com/security/cve/CVE-2016-9447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0075-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00048.html" source="SUSE-SU"/>
    <description>
    The ROM mappings in the NSF decoder in gstreamer 0.10.x allow remote attackers to cause a denial of service (out-of-bounds read or write) and possibly execute arbitrary code via a crafted NSF music file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9447/">CVE-2016-9447</cve>
	<bugzilla href="https://bugzilla.suse.com/1010514">SUSE bug 1010514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517041" comment="gstreamer-0_10-plugins-bad-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517042" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517043" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517044" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517045" comment="libgstbasevideo-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517046" comment="libgstbasevideo-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517047" comment="libgstcodecparsers-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517048" comment="libgstphotography-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517049" comment="libgstphotography-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517050" comment="libgstsignalprocessor-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517051" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517052" comment="libgstvdp-0_10-23-0.10.23-19.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517053" comment="libgstvdp-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517983" comment="gstreamer-0_10-plugins-bad-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517984" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517985" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517986" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517987" comment="libgstbasevideo-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517988" comment="libgstbasevideo-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517989" comment="libgstcodecparsers-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517990" comment="libgstphotography-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517991" comment="libgstphotography-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517992" comment="libgstsignalprocessor-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517993" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517994" comment="libgstvdp-0_10-23-0.10.23-22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517995" comment="libgstvdp-0_10-23-32bit-0.10.23-22.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<bugzilla href="https://bugzilla.suse.com/1010161">SUSE bug 1010161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011103">SUSE bug 1011103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538" source="SUSE CVE"/>
    <description>
    tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in readContigStripsIntoBuffer() because of a uint16 integer overflow. Reported as MSVR 35100.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538</cve>
	<bugzilla href="https://bugzilla.suse.com/1004519">SUSE bug 1004519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011841">SUSE bug 1011841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00034.html" source="SUSE-SU"/>
    <description>
    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516713" comment="kernel-default-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516714" comment="kernel-default-devel-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516715" comment="kernel-default-extra-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516716" comment="kernel-devel-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516717" comment="kernel-macros-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516718" comment="kernel-source-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516719" comment="kernel-syms-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516720" comment="kernel-xen-3.12.67-60.64.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516721" comment="kernel-xen-devel-3.12.67-60.64.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517528" comment="kernel-default-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517529" comment="kernel-default-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517530" comment="kernel-default-extra-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517531" comment="kernel-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517532" comment="kernel-macros-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517533" comment="kernel-source-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517534" comment="kernel-syms-4.4.21-84.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9556" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3024-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516767" comment="ImageMagick-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516768" comment="libMagick++-6_Q16-3-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516769" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516770" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516771" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9559" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3024-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516767" comment="ImageMagick-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516768" comment="libMagick++-6_Q16-3-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516769" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516770" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516771" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517125" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517126" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9572" ref_url="https://www.suse.com/security/cve/CVE-2016-9572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the way openjpeg 2.1.2 decoded certain input images. Due to a logic error in the code responsible for decoding the input image, an application using openjpeg to process image data could crash when processing a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9572/">CVE-2016-9572</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014543">SUSE bug 1014543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014543">SUSE bug 1014543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9574" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00089.html" source="SUSE-SU"/>
    <description>
    nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html" source="SUSE-SU"/>
    <description>
    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014271">SUSE bug 1014271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019668">SUSE bug 1019668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516747" comment="kernel-default-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516748" comment="kernel-default-devel-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516749" comment="kernel-default-extra-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516750" comment="kernel-devel-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516751" comment="kernel-macros-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516752" comment="kernel-source-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516753" comment="kernel-syms-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516754" comment="kernel-xen-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516755" comment="kernel-xen-devel-3.12.67-60.64.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517538" comment="kernel-default-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517539" comment="kernel-default-devel-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517540" comment="kernel-default-extra-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517541" comment="kernel-devel-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517542" comment="kernel-macros-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517543" comment="kernel-source-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517544" comment="kernel-syms-4.4.21-90.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00015.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517077" comment="libspice-server1-0.12.5-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518386" comment="libspice-server1-0.12.7-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00015.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517077" comment="libspice-server1-0.12.5-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518386" comment="libspice-server1-0.12.7-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9580" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9580" ref_url="https://www.suse.com/security/cve/CVE-2016-9580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability was found in tiftoimage function in openjpeg 2.1.2, resulting in heap buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9580/">CVE-2016-9580</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014975">SUSE bug 1014975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9581" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9581" ref_url="https://www.suse.com/security/cve/CVE-2016-9581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An infinite loop vulnerability in tiftoimage that results in heap buffer overflow in convert_32s_C1P1 was found in openjpeg 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9581/">CVE-2016-9581</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014975">SUSE bug 1014975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9583" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517251" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517252" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517251" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517252" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9584" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00108.html" source="SUSE-SU"/>
    <description>
    libical allows remote attackers to cause a denial of service (use-after-free) and possibly read heap memory via a crafted ics file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159508" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159509" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517937" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517938" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1105-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00094.html" source="SUSE-SU"/>
    <description>
    curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517298" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517299" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517300" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9588" ref_url="https://www.suse.com/security/cve/CVE-2016-9588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9588/">CVE-2016-9588</cve>
	<bugzilla href="https://bugzilla.suse.com/1015703">SUSE bug 1015703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017512">SUSE bug 1017512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9591" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
    <description>
    JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517125" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517126" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9594" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594" source="SUSE CVE"/>
    <description>
    curl before version 7.52.1 is vulnerable to an uninitialized random in libcurl's internal function that returns a good 32bit random value.  Having a weak or virtually non-existent random value makes the operations that use it vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594</cve>
	<bugzilla href="https://bugzilla.suse.com/1016738">SUSE bug 1016738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017161">SUSE bug 1017161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9597" ref_url="https://www.suse.com/security/cve/CVE-2016-9597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html" source="SUSE-SU"/>
    <description>
    It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9597/">CVE-2016-9597</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517391" comment="libxml2-2-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517392" comment="libxml2-2-32bit-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517393" comment="libxml2-tools-2.9.1-26.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517394" comment="python-libxml2-2.9.1-26.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518369" comment="libxml2-2-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518370" comment="libxml2-2-32bit-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518371" comment="libxml2-tools-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518372" comment="python-libxml2-2.9.4-33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9598" ref_url="https://www.suse.com/security/cve/CVE-2016-9598" source="SUSE CVE"/>
    <description>
    libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2016-4483.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9598/">CVE-2016-9598</cve>
	<bugzilla href="https://bugzilla.suse.com/1026099">SUSE bug 1026099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334009" comment="libxml2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9600" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517251" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517252" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9601" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517452" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517453" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9602" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517318" comment="xen-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517319" comment="xen-kmp-default-4.5.5_10_k3.12.69_60.64.35-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517320" comment="xen-libs-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517321" comment="xen-libs-32bit-4.5.5_10-22.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9604" ref_url="https://www.suse.com/security/cve/CVE-2016-9604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9604/">CVE-2016-9604</cve>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9621" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-9429.  Reason: This candidate is a reservation duplicate of CVE-2016-9429.  Notes: All CVE users should reference CVE-2016-9429 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<bugzilla href="https://bugzilla.suse.com/1011278">SUSE bug 1011278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9625" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9626" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9627" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9628" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9629" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9630" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9631" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9633" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (infinite loop and resource consumption) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via the start_line parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517032" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517033" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516822" comment="gstreamer-plugins-good-1.2.4-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516823" comment="gstreamer-plugins-good-lang-1.2.4-2.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517655" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517656" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517606" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517032" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517033" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516822" comment="gstreamer-plugins-good-1.2.4-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516823" comment="gstreamer-plugins-good-lang-1.2.4-2.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517655" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517656" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517606" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'write count' that goes beyond the initialized buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517032" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517033" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516822" comment="gstreamer-plugins-good-1.2.4-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516823" comment="gstreamer-plugins-good-lang-1.2.4-2.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517655" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517656" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517606" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9637" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9644" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9644" ref_url="https://www.suse.com/security/cve/CVE-2016-9644" source="SUSE CVE"/>
    <description>
    The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel 4.4.22 through 4.4.28 contains extended asm statements that are incompatible with the exception table, which allows local users to obtain root access on non-SMEP platforms via a crafted application.  NOTE: this vulnerability exists because of incorrect backporting of the CVE-2016-9178 patch to older kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9644/">CVE-2016-9644</cve>
	<bugzilla href="https://bugzilla.suse.com/1008650">SUSE bug 1008650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012353">SUSE bug 1012353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685</cve>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9755" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9755" ref_url="https://www.suse.com/security/cve/CVE-2016-9755" source="SUSE CVE"/>
    <description>
    The netfilter subsystem in the Linux kernel before 4.9 mishandles IPv6 reassembly, which allows local users to cause a denial of service (integer overflow, out-of-bounds write, and GPF) or possibly have unspecified other impact via a crafted application that makes socket, connect, and writev system calls, related to net/ipv6/netfilter/nf_conntrack_reasm.c and net/ipv6/netfilter/nf_defrag_ipv6_hooks.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9755/">CVE-2016-9755</cve>
	<bugzilla href="https://bugzilla.suse.com/1013060">SUSE bug 1013060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00000.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9773" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516767" comment="ImageMagick-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516768" comment="libMagick++-6_Q16-3-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516769" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516770" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516771" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024182">SUSE bug 1024182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9777" ref_url="https://www.suse.com/security/cve/CVE-2016-9777" source="SUSE CVE"/>
    <description>
    KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does not properly restrict the VCPU index, which allows guest OS users to gain host OS privileges or cause a denial of service (out-of-bounds array access and host OS crash) via a crafted interrupt request, related to arch/x86/kvm/ioapic.c and arch/x86/kvm/ioapic.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9777/">CVE-2016-9777</cve>
	<bugzilla href="https://bugzilla.suse.com/1013283">SUSE bug 1013283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9778" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9778" ref_url="https://www.suse.com/security/cve/CVE-2016-9778" source="SUSE CVE"/>
    <description>
    An error in handling certain queries can cause an assertion failure when a server is using the nxdomain-redirect feature to cover a zone for which it is also providing authoritative service. A vulnerable server could be intentionally stopped by an attacker if it was using a configuration that met the criteria for the vulnerability and if the attacker could cause it to accept a query that possessed the required attributes. Please note: This vulnerability affects the "nxdomain-redirect" feature, which is one of two methods of handling NXDOMAIN redirection, and is only available in certain versions of BIND. Redirection using zones of type "redirect" is not affected by this vulnerability. Affects BIND 9.9.8-S1 -&gt; 9.9.8-S3, 9.9.9-S1 -&gt; 9.9.9-S6, 9.11.0-9.11.0-P1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9778/">CVE-2016-9778</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018703">SUSE bug 1018703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html" source="SUSE-SU"/>
    <description>
    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013543">SUSE bug 1013543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516747" comment="kernel-default-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516748" comment="kernel-default-devel-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516749" comment="kernel-default-extra-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516750" comment="kernel-devel-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516751" comment="kernel-macros-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516752" comment="kernel-source-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516753" comment="kernel-syms-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516754" comment="kernel-xen-3.12.67-60.64.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516755" comment="kernel-xen-devel-3.12.67-60.64.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517538" comment="kernel-default-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517539" comment="kernel-default-devel-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517540" comment="kernel-default-extra-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517541" comment="kernel-devel-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517542" comment="kernel-macros-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517543" comment="kernel-source-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517544" comment="kernel-syms-4.4.21-90.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer over-read was observed in "l2cap_dump" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797</cve>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521197" comment="bluez-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521198" comment="bluez-cups-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521199" comment="libbluetooth3-5.13-5.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2588-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00072.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a use-after-free was identified in "conf_opt" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521197" comment="bluez-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521198" comment="bluez-cups-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521199" comment="libbluetooth3-5.13-5.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522346" comment="bluez-5.13-5.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522347" comment="bluez-cups-5.13-5.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522348" comment="libbluetooth3-5.13-5.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9799" ref_url="https://www.suse.com/security/cve/CVE-2016-9799" source="SUSE CVE"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "pklg_read_hci" function in "btsnoop.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9799/">CVE-2016-9799</cve>
	<bugzilla href="https://bugzilla.suse.com/1013716">SUSE bug 1013716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00064.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<bugzilla href="https://bugzilla.suse.com/1013721">SUSE bug 1013721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520445" comment="bluez-5.13-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520446" comment="bluez-cups-5.13-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520447" comment="libbluetooth3-5.13-5.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9801" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00064.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" function in "tools/parser/l2cap.c" source file when processing corrupted dump file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801</cve>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520445" comment="bluez-5.13-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520446" comment="bluez-cups-5.13-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520447" comment="libbluetooth3-5.13-5.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9802" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802</cve>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521197" comment="bluez-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521198" comment="bluez-cups-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521199" comment="libbluetooth3-5.13-5.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9804" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm-&gt;ptr" parameter. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804</cve>
	<bugzilla href="https://bugzilla.suse.com/1013877">SUSE bug 1013877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512050" comment="bluez-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512051" comment="bluez-cups-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512052" comment="libbluetooth3-5.13-5.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519723" comment="bluez-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519724" comment="bluez-cups-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519725" comment="libbluetooth3-5.13-5.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806</cve>
	<bugzilla href="https://bugzilla.suse.com/1013540">SUSE bug 1013540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017589">SUSE bug 1017589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The flx_decode_chunks function in gst/flx/gstflxdec.c in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted FLIC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517032" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517033" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516822" comment="gstreamer-plugins-good-1.2.4-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516823" comment="gstreamer-plugins-good-lang-1.2.4-2.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517655" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517656" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517606" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The FLIC decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via a crafted series of skip and count pairs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517032" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517033" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516822" comment="gstreamer-plugins-good-1.2.4-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516823" comment="gstreamer-plugins-good-lang-1.2.4-2.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517655" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517656" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517606" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0152-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0157-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00147.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517054" comment="gstreamer-0_10-plugins-bad-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517055" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516826" comment="gstreamer-plugins-bad-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516827" comment="gstreamer-plugins-bad-lang-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517056" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517057" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516828" comment="libgstbasecamerabinsrc-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517058" comment="libgstbasevideo-0_10-23-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517059" comment="libgstbasevideo-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517060" comment="libgstcodecparsers-0_10-23-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516829" comment="libgstcodecparsers-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516831" comment="libgstmpegts-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517061" comment="libgstphotography-0_10-23-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517062" comment="libgstphotography-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516832" comment="libgstphotography-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517063" comment="libgstsignalprocessor-0_10-23-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517064" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517065" comment="libgstvdp-0_10-23-0.10.23-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517066" comment="libgstvdp-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518219" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518220" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517594" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517596" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517597" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517598" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517599" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518221" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518222" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517600" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518223" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518224" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518225" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517601" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517602" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517603" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518226" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518227" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517604" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518228" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518229" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517605" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518230" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518231" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517032" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517033" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516822" comment="gstreamer-plugins-good-1.2.4-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516823" comment="gstreamer-plugins-good-lang-1.2.4-2.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517655" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517656" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517606" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0145-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0148-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0311-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00169.html" source="SUSE-SU"/>
    <description>
    The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154327" comment="gstreamer-0_10-plugins-base-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154328" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154329" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154408" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154409" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154410" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154330" comment="libgstapp-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154331" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154411" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154412" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154413" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154414" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154415" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154416" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154332" comment="libgstinterfaces-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154333" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154417" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154418" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154419" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154420" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154421" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154422" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154423" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154424" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154425" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154426" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154427" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154428" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154429" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154430" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517034" comment="gstreamer-0_10-plugins-base-0.10.36-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517035" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517036" comment="gstreamer-0_10-plugins-base-lang-0.10.36-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517461" comment="gstreamer-plugins-base-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517462" comment="gstreamer-plugins-base-lang-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517463" comment="libgstallocators-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517037" comment="libgstapp-0_10-0-0.10.36-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517038" comment="libgstapp-0_10-0-32bit-0.10.36-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517464" comment="libgstapp-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517465" comment="libgstapp-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517466" comment="libgstaudio-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517467" comment="libgstaudio-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517468" comment="libgstfft-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517469" comment="libgstfft-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517039" comment="libgstinterfaces-0_10-0-0.10.36-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517040" comment="libgstinterfaces-0_10-0-32bit-0.10.36-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517470" comment="libgstpbutils-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517471" comment="libgstpbutils-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517472" comment="libgstriff-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517473" comment="libgstrtp-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517474" comment="libgstrtsp-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517475" comment="libgstsdp-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517476" comment="libgsttag-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517477" comment="libgsttag-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517478" comment="libgstvideo-1_0-0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517479" comment="libgstvideo-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517480" comment="typelib-1_0-GstAudio-1_0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517481" comment="typelib-1_0-GstPbutils-1_0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517482" comment="typelib-1_0-GstTag-1_0-1.2.4-2.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517483" comment="typelib-1_0-GstVideo-1_0-1.2.4-2.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517944" comment="gstreamer-0_10-plugins-base-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517945" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517946" comment="gstreamer-0_10-plugins-base-lang-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517610" comment="gstreamer-plugins-base-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517611" comment="gstreamer-plugins-base-lang-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517612" comment="libgstallocators-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517947" comment="libgstapp-0_10-0-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517948" comment="libgstapp-0_10-0-32bit-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517613" comment="libgstapp-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517614" comment="libgstapp-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517615" comment="libgstaudio-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517616" comment="libgstaudio-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517617" comment="libgstfft-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517618" comment="libgstfft-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517949" comment="libgstinterfaces-0_10-0-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517950" comment="libgstinterfaces-0_10-0-32bit-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517619" comment="libgstpbutils-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517620" comment="libgstpbutils-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517621" comment="libgstriff-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517622" comment="libgstrtp-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517623" comment="libgstrtsp-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517624" comment="libgstsdp-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517625" comment="libgsttag-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517626" comment="libgsttag-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517627" comment="libgstvideo-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517628" comment="libgstvideo-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517629" comment="typelib-1_0-GstAudio-1_0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517630" comment="typelib-1_0-GstPbutils-1_0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517631" comment="typelib-1_0-GstTag-1_0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517632" comment="typelib-1_0-GstVideo-1_0-1.8.3-9.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0152-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00084.html" source="SUSE-SU"/>
    <description>
    The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<bugzilla href="https://bugzilla.suse.com/1013678">SUSE bug 1013678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516826" comment="gstreamer-plugins-bad-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516827" comment="gstreamer-plugins-bad-lang-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516828" comment="libgstbasecamerabinsrc-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516829" comment="libgstcodecparsers-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516831" comment="libgstmpegts-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516832" comment="libgstphotography-1_0-0-1.2.4-3.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517594" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517596" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517597" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517598" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517599" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517600" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517601" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517602" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517603" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517604" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517605" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0152-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00084.html" source="SUSE-SU"/>
    <description>
    The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<bugzilla href="https://bugzilla.suse.com/1013680">SUSE bug 1013680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516826" comment="gstreamer-plugins-bad-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516827" comment="gstreamer-plugins-bad-lang-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516828" comment="libgstbasecamerabinsrc-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516829" comment="libgstcodecparsers-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516831" comment="libgstmpegts-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516832" comment="libgstphotography-1_0-0-1.2.4-3.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517594" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517596" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517597" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517598" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517599" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517600" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517601" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517602" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517603" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517604" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517605" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9815" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9815" ref_url="https://www.suse.com/security/cve/CVE-2016-9815" source="SUSE CVE"/>
    <description>
    Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host panic) by sending an asynchronous abort.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9815/">CVE-2016-9815</cve>
	<bugzilla href="https://bugzilla.suse.com/1012652">SUSE bug 1012652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9816" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9816" ref_url="https://www.suse.com/security/cve/CVE-2016-9816" source="SUSE CVE"/>
    <description>
    Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at EL2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9816/">CVE-2016-9816</cve>
	<bugzilla href="https://bugzilla.suse.com/1012652">SUSE bug 1012652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9817" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9817" ref_url="https://www.suse.com/security/cve/CVE-2016-9817" source="SUSE CVE"/>
    <description>
    Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving a (1) data or (2) prefetch abort with the ESR_EL2.EA bit set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9817/">CVE-2016-9817</cve>
	<bugzilla href="https://bugzilla.suse.com/1012652">SUSE bug 1012652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9818" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9818" ref_url="https://www.suse.com/security/cve/CVE-2016-9818" source="SUSE CVE"/>
    <description>
    Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at HYP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9818/">CVE-2016-9818</cve>
	<bugzilla href="https://bugzilla.suse.com/1012652">SUSE bug 1012652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0077-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0080-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022633">SUSE bug 1022633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023215">SUSE bug 1023215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517149" comment="libz1-1.2.8-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517150" comment="libz1-32bit-1.2.8-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518383" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518384" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518385" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0077-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0080-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022633">SUSE bug 1022633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064070">SUSE bug 1064070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517149" comment="libz1-1.2.8-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517150" comment="libz1-32bit-1.2.8-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518383" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518384" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518385" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0077-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0080-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022633">SUSE bug 1022633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023215">SUSE bug 1023215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517149" comment="libz1-1.2.8-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517150" comment="libz1-32bit-1.2.8-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518383" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518384" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518385" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0077-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0080-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512567" comment="libz1-1.2.11-1.27 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512568" comment="libz1-32bit-1.2.11-1.27 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512569" comment="zlib-devel-1.2.11-1.27 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517149" comment="libz1-1.2.8-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517150" comment="libz1-32bit-1.2.8-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009146180" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009146181" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512005" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518383" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518384" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518385" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520123" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9845" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<bugzilla href="https://bugzilla.suse.com/1013767">SUSE bug 1013767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9846" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<bugzilla href="https://bugzilla.suse.com/1013764">SUSE bug 1013764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
    <description>
    HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
    <description>
    The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents. This vulnerability affects Firefox ESR &lt; 45.6 and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014490">SUSE bug 1014490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<bugzilla href="https://bugzilla.suse.com/1014514">SUSE bug 1014514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<bugzilla href="https://bugzilla.suse.com/1014112">SUSE bug 1014112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9914" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9914" ref_url="https://www.suse.com/security/cve/CVE-2016-9914" source="SUSE CVE"/>
    <description>
    Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9914/">CVE-2016-9914</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9915" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9915" ref_url="https://www.suse.com/security/cve/CVE-2016-9915" source="SUSE CVE"/>
    <description>
    Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the handle backend.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9915/">CVE-2016-9915</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9916" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9916" ref_url="https://www.suse.com/security/cve/CVE-2016-9916" source="SUSE CVE"/>
    <description>
    Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the proxy backend.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9916/">CVE-2016-9916</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9917" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<bugzilla href="https://bugzilla.suse.com/1015171">SUSE bug 1015171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521197" comment="bluez-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521198" comment="bluez-cups-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521199" comment="libbluetooth3-5.13-5.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9918" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00054.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, an out-of-bounds read was identified in "packet_hexdump" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918</cve>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521197" comment="bluez-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521198" comment="bluez-cups-5.13-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521199" comment="libbluetooth3-5.13-5.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9919" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9919" ref_url="https://www.suse.com/security/cve/CVE-2016-9919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
    <description>
    The icmp6_send function in net/ipv6/icmp.c in the Linux kernel through 4.8.12 omits a certain check of the dst data structure, which allows remote attackers to cause a denial of service (panic) via a fragmented IPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9919/">CVE-2016-9919</cve>
	<bugzilla href="https://bugzilla.suse.com/1014701">SUSE bug 1014701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014743">SUSE bug 1014743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9923" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923" source="SUSE CVE"/>
    <description>
    Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923</cve>
	<bugzilla href="https://bugzilla.suse.com/1014703">SUSE bug 1014703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015145">SUSE bug 1015145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015148">SUSE bug 1015148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015154">SUSE bug 1015154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516758" comment="xen-4.5.5_04-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516759" comment="xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516760" comment="xen-libs-4.5.5_04-22.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516761" comment="xen-libs-32bit-4.5.5_04-22.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0061-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0598-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009516762" comment="gd-2.1.0-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516763" comment="gd-32bit-2.1.0-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00073.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in rfbproto.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517112" comment="tigervnc-1.4.3-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517113" comment="xorg-x11-Xvnc-1.4.3-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518474" comment="libXvnc1-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518475" comment="tigervnc-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518476" comment="xorg-x11-Xvnc-1.6.0-16.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00073.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517112" comment="tigervnc-1.4.3-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517113" comment="xorg-x11-Xvnc-1.4.3-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518474" comment="libXvnc1-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518475" comment="tigervnc-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518476" comment="xorg-x11-Xvnc-1.6.0-16.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9952" ref_url="https://www.suse.com/security/cve/CVE-2016-9952" source="SUSE CVE"/>
    <description>
    The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9952/">CVE-2016-9952</cve>
	<bugzilla href="https://bugzilla.suse.com/1092958">SUSE bug 1092958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9953" ref_url="https://www.suse.com/security/cve/CVE-2016-9953" source="SUSE CVE"/>
    <description>
    The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9953/">CVE-2016-9953</cve>
	<bugzilla href="https://bugzilla.suse.com/1092956">SUSE bug 1092956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in game-music-emu before 0.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145377" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516766" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9958" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    game-music-emu before 0.6.1 allows remote attackers to write to arbitrary memory locations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145377" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516766" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9959" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    game-music-emu before 0.6.1 allows remote attackers to generate out of bounds 8-bit values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145377" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516766" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    game-music-emu before 0.6.1 allows local users to cause a denial of service (divide by zero and process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145377" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516766" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9961" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    game-music-emu before 0.6.1 mishandles unspecified integer values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009145377" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516766" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9969" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9969" ref_url="https://www.suse.com/security/cve/CVE-2016-9969" source="SUSE CVE"/>
    <description>
    In libwebp 0.5.1, there is a double free bug in libwebpmux.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9969/">CVE-2016-9969</cve>
	<bugzilla href="https://bugzilla.suse.com/1136199">SUSE bug 1136199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338941" comment="libwebp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0358" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0358" ref_url="https://www.suse.com/security/cve/CVE-2017-0358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3587-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0358/">CVE-2017-0358</cve>
	<bugzilla href="https://bugzilla.suse.com/1022500">SUSE bug 1022500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022999">SUSE bug 1022999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520310" comment="libntfs-3g84-2013.1.13-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520311" comment="ntfs-3g-2013.1.13-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520312" comment="ntfsprogs-2013.1.13-5.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0379" ref_url="https://www.suse.com/security/cve/CVE-2017-0379" source="SUSE CVE"/>
    <description>
    Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-0379/">CVE-2017-0379</cve>
	<bugzilla href="https://bugzilla.suse.com/1055837">SUSE bug 1055837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334024" comment="libgcrypt is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00031.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability in silk/NLSF_stabilize.c in libopus in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31607432.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<bugzilla href="https://bugzilla.suse.com/1020102">SUSE bug 1020102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148261" comment="libopus0-1.1-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517090" comment="libopus0-1.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0564" ref_url="https://www.suse.com/security/cve/CVE-2017-0564" source="SUSE CVE"/>
    <description>
    An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-0564/">CVE-2017-0564</cve>
	<bugzilla href="https://bugzilla.suse.com/1033200">SUSE bug 1033200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0605" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0605" ref_url="https://www.suse.com/security/cve/CVE-2017-0605" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0605/">CVE-2017-0605</cve>
	<bugzilla href="https://bugzilla.suse.com/1037331">SUSE bug 1037331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0627" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0627" ref_url="https://www.suse.com/security/cve/CVE-2017-0627" source="SUSE CVE"/>
    <description>
    An information disclosure vulnerability in the kernel UVC driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-33300353.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0627/">CVE-2017-0627</cve>
	<bugzilla href="https://bugzilla.suse.com/1037340">SUSE bug 1037340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0630" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0630" ref_url="https://www.suse.com/security/cve/CVE-2017-0630" source="SUSE CVE"/>
    <description>
    An information disclosure vulnerability in the kernel trace subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34277115.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0630/">CVE-2017-0630</cve>
	<bugzilla href="https://bugzilla.suse.com/1037338">SUSE bug 1037338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0641" ref_url="https://www.suse.com/security/cve/CVE-2017-0641" source="SUSE CVE"/>
    <description>
    A remote denial of service vulnerability in libvpx in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34360591.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0641/">CVE-2017-0641</cve>
	<bugzilla href="https://bugzilla.suse.com/1056539">SUSE bug 1056539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334008" comment="libvpx is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1746-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00000.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517647" comment="libxml2-2-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517648" comment="libxml2-2-32bit-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517649" comment="libxml2-tools-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517650" comment="python-libxml2-2.9.4-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0750" ref_url="https://www.suse.com/security/cve/CVE-2017-0750" source="SUSE CVE"/>
    <description>
    A elevation of privilege vulnerability in the Upstream Linux file system. Product: Android. Versions: Android kernel. Android ID: A-36817013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-0750/">CVE-2017-0750</cve>
	<bugzilla href="https://bugzilla.suse.com/1053160">SUSE bug 1053160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898</cve>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000024" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000024" ref_url="https://www.suse.com/security/cve/CVE-2017-1000024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0642-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Shotwell version 0.24.4 or earlier and 0.25.3 or earlier is vulnerable to an information disclosure in the web publishing plugins resulting in potential password and oauth token plaintext transmission
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000024/">CVE-2017-1000024</cve>
	<bugzilla href="https://bugzilla.suse.com/1054311">SUSE bug 1054311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172771" comment="shotwell-0.22.0+git.20160103-15.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172772" comment="shotwell-lang-0.22.0+git.20160103-15.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518993" comment="shotwell-0.22.0+git.20160103-15.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518994" comment="shotwell-lang-0.22.0+git.20160103-15.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000050" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000061" ref_url="https://www.suse.com/security/cve/CVE-2017-1000061" source="SUSE CVE"/>
    <description>
    xmlsec 1.2.23 and before is vulnerable to XML External Entity Expansion when parsing crafted input documents, resulting in possible information disclosure or denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000061/">CVE-2017-1000061</cve>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082267">SUSE bug 1082267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118959">SUSE bug 1118959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338946" comment="xmlsec1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000082" ref_url="https://www.suse.com/security/cve/CVE-2017-1000082" source="SUSE CVE"/>
    <description>
    systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000082/">CVE-2017-1000082</cve>
	<bugzilla href="https://bugzilla.suse.com/1047023">SUSE bug 1047023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172483">SUSE bug 1172483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00090.html" source="SUSE-SU"/>
    <description>
    backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174438" comment="evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174439" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174440" comment="evince-lang-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174441" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174442" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174443" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174444" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174445" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174446" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174447" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174448" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174449" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174450" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174451" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.22.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518420" comment="evince-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518421" comment="evince-browser-plugin-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518422" comment="evince-lang-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518423" comment="evince-plugin-djvudocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518424" comment="evince-plugin-dvidocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518425" comment="evince-plugin-pdfdocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518426" comment="evince-plugin-psdocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518427" comment="evince-plugin-tiffdocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518428" comment="evince-plugin-xpsdocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518429" comment="libevdocument3-4-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518430" comment="libevview3-3-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518431" comment="nautilus-evince-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518432" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518433" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.19.15 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000099" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099" source="SUSE CVE"/>
    <description>
    When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application's provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099</cve>
	<bugzilla href="https://bugzilla.suse.com/1051645">SUSE bug 1051645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00080.html" source="SUSE-SU"/>
    <description>
    When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518021" comment="curl-7.37.0-37.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518022" comment="libcurl4-7.37.0-37.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518023" comment="libcurl4-32bit-7.37.0-37.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00080.html" source="SUSE-SU"/>
    <description>
    curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101</cve>
	<bugzilla href="https://bugzilla.suse.com/1051643">SUSE bug 1051643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518021" comment="curl-7.37.0-37.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518022" comment="libcurl4-7.37.0-37.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518023" comment="libcurl4-32bit-7.37.0-37.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000111" ref_url="https://www.suse.com/security/cve/CVE-2017-1000111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000111/">CVE-2017-1000111</cve>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052367">SUSE bug 1052367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518005" comment="kernel-default-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518006" comment="kernel-default-devel-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518007" comment="kernel-default-extra-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518008" comment="kernel-devel-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518009" comment="kernel-macros-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518010" comment="kernel-source-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518011" comment="kernel-syms-4.4.74-92.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2438-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2443-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2454-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2465-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2498-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-&gt;len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-&gt;len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052368">SUSE bug 1052368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072162">SUSE bug 1072162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518005" comment="kernel-default-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518006" comment="kernel-default-devel-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518007" comment="kernel-default-extra-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518008" comment="kernel-devel-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518009" comment="kernel-macros-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518010" comment="kernel-source-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518011" comment="kernel-syms-4.4.74-92.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000121" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000121" ref_url="https://www.suse.com/security/cve/CVE-2017-1000121" source="SUSE CVE"/>
    <description>
    The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-1000121/">CVE-2017-1000121</cve>
	<bugzilla href="https://bugzilla.suse.com/1078996">SUSE bug 1078996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000122" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000122" ref_url="https://www.suse.com/security/cve/CVE-2017-1000122" source="SUSE CVE"/>
    <description>
    The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate certain message metadata, allowing a compromised secondary process to cause a denial of service (release assertion) of the UI process. This vulnerability does not affect Apple products.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000122/">CVE-2017-1000122</cve>
	<bugzilla href="https://bugzilla.suse.com/1078994">SUSE bug 1078994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334025" comment="webkitgtk3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000126" ref_url="https://www.suse.com/security/cve/CVE-2017-1000126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    exiv2 0.26 contains a Stack out of bounds read in webp parser
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000126/">CVE-2017-1000126</cve>
	<bugzilla href="https://bugzilla.suse.com/1068873">SUSE bug 1068873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000127" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000127" ref_url="https://www.suse.com/security/cve/CVE-2017-1000127" source="SUSE CVE"/>
    <description>
    Exiv2 0.26 contains a heap buffer overflow in tiff parser
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000127/">CVE-2017-1000127</cve>
	<bugzilla href="https://bugzilla.suse.com/1068872">SUSE bug 1068872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000128" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000128" ref_url="https://www.suse.com/security/cve/CVE-2017-1000128" source="SUSE CVE"/>
    <description>
    Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000128/">CVE-2017-1000128</cve>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0768-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180768-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00098.html" source="SUSE-SU"/>
    <description>
    CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520990" comment="libpython2_7-1_0-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520991" comment="libpython2_7-1_0-32bit-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520992" comment="python-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520993" comment="python-base-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520994" comment="python-curses-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520995" comment="python-devel-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520996" comment="python-tk-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520997" comment="python-xml-2.7.13-28.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003891.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00035.html" source="SUSE-SU"/>
    <description>
    Command injection in evince via filename when printing to PDF. This affects versions earlier than 3.25.91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159</cve>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520638" comment="evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520639" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520640" comment="evince-lang-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520641" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520642" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520643" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520644" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520645" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520646" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520647" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520648" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520649" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520650" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.22.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520651" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.22.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000215" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000215" ref_url="https://www.suse.com/security/cve/CVE-2017-1000215" source="SUSE CVE"/>
    <description>
    ROOT xrootd version 4.6.0 and below is vulnerable to an unauthenticated shell command injection resulting in remote code execution
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000215/">CVE-2017-1000215</cve>
	<bugzilla href="https://bugzilla.suse.com/1068868">SUSE bug 1068868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338949" comment="xrootd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000249" ref_url="https://www.suse.com/security/cve/CVE-2017-1000249" source="SUSE CVE"/>
    <description>
    An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-1000249/">CVE-2017-1000249</cve>
	<bugzilla href="https://bugzilla.suse.com/1056838">SUSE bug 1056838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334026" comment="file is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00069.html" source="SUSE-SU"/>
    <description>
    All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250</cve>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512050" comment="bluez-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512051" comment="bluez-cups-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512052" comment="libbluetooth3-5.13-5.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519723" comment="bluez-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519724" comment="bluez-cups-5.13-5.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519725" comment="libbluetooth3-5.13-5.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2548-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2787-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2794-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="TID000019028" ref_url="https://www.suse.com/support/kb/doc/?id=000019028" source="SUSE-SU"/>
		<reference ref_id="TID7021383" ref_url="https://www.suse.com/support/kb/doc/?id=7021383" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057950">SUSE bug 1057950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072162">SUSE bug 1072162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518098" comment="kernel-default-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518099" comment="kernel-default-devel-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518100" comment="kernel-default-extra-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518101" comment="kernel-devel-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518102" comment="kernel-macros-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518103" comment="kernel-source-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518104" comment="kernel-syms-4.4.74-92.38.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519456" comment="kernel-default-4.4.82-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519457" comment="kernel-default-devel-4.4.82-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519458" comment="kernel-default-extra-4.4.82-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519459" comment="kernel-devel-4.4.82-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519460" comment="kernel-macros-4.4.82-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519461" comment="kernel-source-4.4.82-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519462" comment="kernel-syms-4.4.82-6.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00019.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000253" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
    <description>
    Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm-&gt;mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm-&gt;mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm-&gt;mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253</cve>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061680">SUSE bug 1061680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075506">SUSE bug 1075506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2880-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00098.html" source="SUSE-SU"/>
    <description>
    libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518234" comment="curl-7.37.0-37.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518235" comment="libcurl4-7.37.0-37.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518236" comment="libcurl4-32bit-7.37.0-37.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000255" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000255" ref_url="https://www.suse.com/security/cve/CVE-2017-1000255" source="SUSE CVE"/>
    <description>
    On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000255/">CVE-2017-1000255</cve>
	<bugzilla href="https://bugzilla.suse.com/1061633">SUSE bug 1061633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00096.html" source="SUSE-SU"/>
    <description>
    libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256</cve>
	<bugzilla href="https://bugzilla.suse.com/1062563">SUSE bug 1062563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519545" comment="libvirt-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519546" comment="libvirt-admin-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519547" comment="libvirt-client-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519548" comment="libvirt-daemon-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519549" comment="libvirt-daemon-config-network-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519550" comment="libvirt-daemon-config-nwfilter-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519551" comment="libvirt-daemon-driver-interface-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519552" comment="libvirt-daemon-driver-libxl-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519553" comment="libvirt-daemon-driver-lxc-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519554" comment="libvirt-daemon-driver-network-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519555" comment="libvirt-daemon-driver-nodedev-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519556" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519557" comment="libvirt-daemon-driver-qemu-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519558" comment="libvirt-daemon-driver-secret-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519559" comment="libvirt-daemon-driver-storage-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519560" comment="libvirt-daemon-driver-storage-core-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519561" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519562" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519563" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519564" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519565" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519566" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519567" comment="libvirt-daemon-lxc-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519568" comment="libvirt-daemon-qemu-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519569" comment="libvirt-daemon-xen-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519570" comment="libvirt-doc-3.3.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519571" comment="libvirt-libs-3.3.0-5.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2880-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00098.html" source="SUSE-SU"/>
    <description>
    An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257</cve>
	<bugzilla href="https://bugzilla.suse.com/1063824">SUSE bug 1063824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518234" comment="curl-7.37.0-37.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518235" comment="libcurl4-7.37.0-37.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518236" comment="libcurl4-32bit-7.37.0-37.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1922-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1945-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7020973" ref_url="https://www.suse.com/support/kb/doc/?id=7020973" source="SUSE-SU"/>
		<reference ref_id="TID7021086" ref_url="https://www.suse.com/support/kb/doc/?id=7021086" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00032.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042200">SUSE bug 1042200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044985">SUSE bug 1044985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075506">SUSE bug 1075506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517657" comment="kernel-default-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517658" comment="kernel-default-devel-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517659" comment="kernel-default-extra-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517660" comment="kernel-devel-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517661" comment="kernel-macros-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517662" comment="kernel-source-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517663" comment="kernel-syms-4.4.59-92.24.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00010.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039349">SUSE bug 1039349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054557">SUSE bug 1054557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="TID7020973" ref_url="https://www.suse.com/support/kb/doc/?id=7020973" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00024.html" source="SUSE-SU"/>
    <description>
    glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518738" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518739" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518740" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518741" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518742" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518743" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518744" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518745" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517460" comment="sudo-1.8.10p3-2.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518692" comment="sudo-1.8.10p3-10.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="TID7021027" ref_url="https://www.suse.com/support/kb/doc/?id=7021027" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00034.html" source="SUSE-SU"/>
    <description>
    Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045986">SUSE bug 1045986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517697" comment="sudo-1.8.10p3-10.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000379" ref_url="https://www.suse.com/security/cve/CVE-2017-1000379" source="SUSE CVE"/>
    <description>
    The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000379/">CVE-2017-1000379</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044934">SUSE bug 1044934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00026.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2179-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00061.html" source="SUSE-SU"/>
    <description>
    The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512258" comment="libcares2-1.9.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512259" comment="libcares2-32bit-1.9.1-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517701" comment="libcares2-1.9.1-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517702" comment="libcares2-32bit-1.9.1-8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000405" ref_url="https://www.suse.com/security/cve/CVE-2017-1000405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000405/">CVE-2017-1000405</cve>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070307">SUSE bug 1070307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518389" comment="kernel-default-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518390" comment="kernel-default-devel-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518391" comment="kernel-default-extra-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518392" comment="kernel-devel-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518393" comment="kernel-macros-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518394" comment="kernel-source-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518395" comment="kernel-syms-4.4.90-92.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519630" comment="kernel-default-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519631" comment="kernel-default-devel-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519632" comment="kernel-default-extra-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519633" comment="kernel-devel-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519634" comment="kernel-macros-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519635" comment="kernel-source-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519636" comment="kernel-syms-4.4.92-6.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519055" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519056" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519057" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519058" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519060" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519061" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519062" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519055" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519056" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519057" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519058" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519060" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519061" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519062" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their uninitialized state. By manipulating the code flows that precede the handling of these configuration messages, an attacker can also gain some control over which data will be held in the uninitialized stack variables. This can allow him to bypass KASLR, and stack canaries protection - as both pointers and stack canaries may be leaked in this manner. Combining this vulnerability (for example) with the previously disclosed RCE vulnerability in L2CAP configuration parsing (CVE-2017-1000251) may allow an attacker to exploit the RCE against kernels which were built with the above mitigations. These are the specifics of this vulnerability: In the function l2cap_parse_conf_rsp and in the function l2cap_parse_conf_req the following variable is declared without initialization: struct l2cap_conf_efs efs; In addition, when parsing input configuration parameters in both of these functions, the switch case for handling EFS elements may skip the memcpy call that will write to the efs variable: ... case L2CAP_CONF_EFS: if (olen == sizeof(efs)) memcpy(&amp;efs, (void *)val, olen); ... The olen in the above if is attacker controlled, and regardless of that if, in both of these functions the efs variable would eventually be added to the outgoing configuration request that is being built: l2cap_add_conf_opt(&amp;ptr, L2CAP_CONF_EFS, sizeof(efs), (unsigned long) &amp;efs); So by sending a configuration request, or response, that contains an L2CAP_CONF_EFS element, but with an element length that is not sizeof(efs) - the memcpy to the uninitialized efs variable can be avoided, and the uninitialized variable would be returned to the attacker (16 bytes).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000422" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000422" ref_url="https://www.suse.com/security/cve/CVE-2017-1000422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Gnome gdk-pixbuf 2.36.8 and older is vulnerable to several integer overflow in the gif_get_lzw function resulting in memory corruption and potential code execution
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000422/">CVE-2017-1000422</cve>
	<bugzilla href="https://bugzilla.suse.com/1074462">SUSE bug 1074462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519786" comment="gdk-pixbuf-lang-2.34.0-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519787" comment="gdk-pixbuf-query-loaders-2.34.0-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519788" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519789" comment="libgdk_pixbuf-2_0-0-2.34.0-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519790" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519791" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000445" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-1 and older version are vulnerable to null pointer dereference in the MagickCore component and might lead to denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    freedesktop.org libpoppler 0.60.1 fails to validate boundaries in TextPool::addWord, leading to overflow in subsequent calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456</cve>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000476" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-12 Q16, a CPU exhaustion vulnerability was found in the function ReadDDSInfo in coders/dds.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<bugzilla href="https://bugzilla.suse.com/1049308">SUSE bug 1049308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10105" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10125" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00029.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518851" comment="libmysqlclient18-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518852" comment="libmysqlclient18-32bit-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518853" comment="libmysqlclient_r18-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518854" comment="libmysqlclient_r18-32bit-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518855" comment="mariadb-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518856" comment="mariadb-client-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518857" comment="mariadb-errormessages-10.0.33-29.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10320" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320</cve>
	<bugzilla href="https://bugzilla.suse.com/1064113">SUSE bug 1064113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 3.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365</cve>
	<bugzilla href="https://bugzilla.suse.com/1064114">SUSE bug 1064114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00029.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518851" comment="libmysqlclient18-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518852" comment="libmysqlclient18-32bit-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518853" comment="libmysqlclient_r18-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518854" comment="libmysqlclient_r18-32bit-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518855" comment="mariadb-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518856" comment="mariadb-client-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518857" comment="mariadb-errormessages-10.0.33-29.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00073.html" source="SUSE-SU"/>
    <description>
    Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-08-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661</cve>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053153">SUSE bug 1053153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519444" comment="qemu-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519445" comment="qemu-block-curl-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519446" comment="qemu-ipxe-1.0.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519447" comment="qemu-kvm-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519448" comment="qemu-seabios-1.10.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519449" comment="qemu-sgabios-8-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519450" comment="qemu-tools-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519451" comment="qemu-vgabios-1.10.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519452" comment="qemu-x86-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519438" comment="xen-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519439" comment="xen-libs-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519440" comment="xen-libs-32bit-4.9.0_11-3.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10672" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00056.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069732">SUSE bug 1069732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169826" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519189" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2158-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517974" comment="libncurses5-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517975" comment="libncurses5-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517976" comment="libncurses6-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517977" comment="libncurses6-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517978" comment="ncurses-devel-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517979" comment="ncurses-utils-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517980" comment="tack-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517981" comment="terminfo-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517982" comment="terminfo-base-5.9-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2158-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517974" comment="libncurses5-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517975" comment="libncurses5-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517976" comment="libncurses6-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517977" comment="libncurses6-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517978" comment="ncurses-devel-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517979" comment="ncurses-utils-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517980" comment="tack-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517981" comment="terminfo-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517982" comment="terminfo-base-5.9-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10689" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10689" ref_url="https://www.suse.com/security/cve/CVE-2017-10689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0471-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00058.html" source="SUSE-SU"/>
    <description>
    In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10689/">CVE-2017-10689</cve>
	<bugzilla href="https://bugzilla.suse.com/1080288">SUSE bug 1080288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518973" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00000.html" source="SUSE-SU"/>
    <description>
    The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047453">SUSE bug 1047453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520080" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520081" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520082" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10794" ref_url="https://www.suse.com/security/cve/CVE-2017-10794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00073.html" source="SUSE-SU"/>
    <description>
    When GraphicsMagick 1.3.25 processes an RGB TIFF picture (with metadata indicating a single sample per pixel) in coders/tiff.c, a buffer overflow occurs, related to QuantumTransferMode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-10794/">CVE-2017-10794</cve>
	<bugzilla href="https://bugzilla.suse.com/1112392">SUSE bug 1112392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    When GraphicsMagick 1.3.25 processes a MATLAB image in coders/mat.c, it can lead to a denial of service (OOM) in ReadMATImage() if the size specified for a MAT Object is larger than the actual amount of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519444" comment="qemu-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519445" comment="qemu-block-curl-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519446" comment="qemu-ipxe-1.0.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519447" comment="qemu-kvm-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519448" comment="qemu-seabios-1.10.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519449" comment="qemu-sgabios-8-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519450" comment="qemu-tools-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519451" comment="qemu-vgabios-1.10.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519452" comment="qemu-x86-2.9.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10810" ref_url="https://www.suse.com/security/cve/CVE-2017-10810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10810/">CVE-2017-10810</cve>
	<bugzilla href="https://bugzilla.suse.com/1047277">SUSE bug 1047277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520525" comment="drm-kmp-default-4.9.33_k4.4.114_94.11-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10911" ref_url="https://www.suse.com/security/cve/CVE-2017-10911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10911/">CVE-2017-10911</cve>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043330">SUSE bug 1043330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057378">SUSE bug 1057378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519572" comment="qemu-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519573" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519575" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519578" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10915" ref_url="https://www.suse.com/security/cve/CVE-2017-10915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00011.html" source="SUSE-SU"/>
    <description>
    The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10915/">CVE-2017-10915</cve>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10928" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-0, a heap-based buffer over-read in the GetNextToken function in token.c allows remote attackers to obtain sensitive information from process memory or possibly have unspecified other impact via a crafted SVG document that is mishandled in the GetUserSpaceCoordinateValue function in coders/svg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047359">SUSE bug 1047359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096261">SUSE bug 1096261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1885-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00025.html" source="SUSE-SU"/>
    <description>
    In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517906" comment="xorg-x11-server-7.6_1.18.3-74.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517907" comment="xorg-x11-server-extra-7.6_1.18.3-74.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1885-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517906" comment="xorg-x11-server-7.6_1.18.3-74.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517907" comment="xorg-x11-server-extra-7.6_1.18.3-74.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="TID7022306" ref_url="https://www.suse.com/support/kb/doc/?id=7022306" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html" source="SUSE-SU"/>
    <description>
    The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989</cve>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521147" comment="libsqlite3-0-3.8.10.2-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521148" comment="libsqlite3-0-32bit-3.8.10.2-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521149" comment="sqlite3-3.8.10.2-9.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The mng_get_long function in coders/png.c in ImageMagick 7.0.6-0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted MNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="TID7021155" ref_url="https://www.suse.com/support/kb/doc/?id=7021155" source="SUSE-SU"/>
		<reference ref_id="TID7022454" ref_url="https://www.suse.com/support/kb/doc/?id=7022454" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00077.html" source="SUSE-SU"/>
    <description>
    Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103</cve>
	<bugzilla href="https://bugzilla.suse.com/1048278">SUSE bug 1048278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519204" comment="libdcerpc-binding0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519205" comment="libdcerpc-binding0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519206" comment="libdcerpc0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519207" comment="libdcerpc0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519208" comment="libndr-krb5pac0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519209" comment="libndr-krb5pac0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519210" comment="libndr-nbt0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519211" comment="libndr-nbt0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519212" comment="libndr-standard0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519213" comment="libndr-standard0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519214" comment="libndr0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519215" comment="libndr0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519216" comment="libnetapi0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519217" comment="libnetapi0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519218" comment="libsamba-credentials0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519219" comment="libsamba-credentials0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519220" comment="libsamba-errors0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519221" comment="libsamba-errors0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519222" comment="libsamba-hostconfig0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519223" comment="libsamba-hostconfig0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519224" comment="libsamba-passdb0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519225" comment="libsamba-passdb0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519226" comment="libsamba-util0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519227" comment="libsamba-util0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519228" comment="libsamdb0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519229" comment="libsamdb0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519230" comment="libsmbclient0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519231" comment="libsmbclient0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519232" comment="libsmbconf0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519233" comment="libsmbconf0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519234" comment="libsmbldap0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519235" comment="libsmbldap0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519236" comment="libtevent-util0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519237" comment="libtevent-util0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519238" comment="libwbclient0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519239" comment="libwbclient0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519240" comment="samba-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519241" comment="samba-client-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519242" comment="samba-client-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519243" comment="samba-doc-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519244" comment="samba-libs-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519245" comment="samba-libs-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519246" comment="samba-winbind-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519247" comment="samba-winbind-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2158-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517974" comment="libncurses5-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517975" comment="libncurses5-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517976" comment="libncurses6-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517977" comment="libncurses6-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517978" comment="ncurses-devel-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517979" comment="ncurses-utils-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517980" comment="tack-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517981" comment="terminfo-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517982" comment="terminfo-base-5.9-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2158-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517974" comment="libncurses5-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517975" comment="libncurses5-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517976" comment="libncurses6-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517977" comment="libncurses6-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517978" comment="ncurses-devel-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517979" comment="ncurses-utils-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517980" comment="tack-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517981" comment="terminfo-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517982" comment="terminfo-base-5.9-50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11141" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11170" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11170" ref_url="https://www.suse.com/security/cve/CVE-2017-11170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadTGAImage function in coders\tga.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via invalid colors data in the header of a TGA or VST file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11170/">CVE-2017-11170</cve>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048272">SUSE bug 1048272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11171" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11171" ref_url="https://www.suse.com/security/cve/CVE-2017-11171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003137.html" source="SUSE-SU"/>
    <description>
    Bad reference counting in the context of accept_ice_connection() in gsm-xsmp-server.c in old versions of gnome-session up until version 2.29.92 allows a local attacker to establish ICE connections to gnome-session with invalid authentication data (an invalid magic cookie). Each failed authentication attempt will leak a file descriptor in gnome-session. When the maximum number of file descriptors is exhausted in the gnome-session process, it will enter an infinite loop trying to communicate without success, consuming 100% of the CPU. The graphical session associated with the gnome-session process will stop working correctly, because communication with gnome-session is no longer possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11171/">CVE-2017-11171</cve>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334055" comment="xorg-x11 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11185" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003167.html" source="SUSE-SU"/>
    <description>
    The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518012" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518013" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518014" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518015" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11188" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadDPXImage function in coders\dpx.c in ImageMagick 7.0.6-0 has a large loop vulnerability that can cause CPU exhaustion via a crafted DPX file, related to lack of an EOF check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11331" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11331" ref_url="https://www.suse.com/security/cve/CVE-2017-11331" source="SUSE CVE"/>
    <description>
    The wav_open function in oggenc/audio.c in Xiph.Org vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (memory allocation error) via a crafted wav file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11331/">CVE-2017-11331</cve>
	<bugzilla href="https://bugzilla.suse.com/1081744">SUSE bug 1081744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338951" comment="vorbis-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11334" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519444" comment="qemu-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519445" comment="qemu-block-curl-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519446" comment="qemu-ipxe-1.0.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519447" comment="qemu-kvm-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519448" comment="qemu-seabios-1.10.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519449" comment="qemu-sgabios-8-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519450" comment="qemu-tools-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519451" comment="qemu-vgabios-1.10.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519452" comment="qemu-x86-2.9.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1985-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00068.html" source="SUSE-SU"/>
    <description>
    The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 has an out-of-order CloseBlob call, resulting in a use-after-free via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053809">SUSE bug 1053809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084062">SUSE bug 1084062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518028" comment="ImageMagick-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518029" comment="libMagick++-6_Q16-3-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518030" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518032" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11406" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by rejecting invalid Frame Control parameter values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517958" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517959" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517960" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517961" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517962" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517963" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the MQ dissector could crash. This was addressed in epan/dissectors/packet-mq.c by validating the fragment length before a reassembly attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517958" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517959" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517960" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517961" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517962" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517963" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the AMQP dissector could crash. This was addressed in epan/dissectors/packet-amqp.c by checking for successful list dissection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517958" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517959" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517960" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517961" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517962" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517963" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11410" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding validation of the relationships between indexes and lengths. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-7702.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517958" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517959" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517960" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517961" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517962" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517963" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11411" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by adding length validation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-9350.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517958" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517959" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517960" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517961" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517962" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517963" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
    <description>
    The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519046" comment="clamav-0.99.4-33.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519444" comment="qemu-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519445" comment="qemu-block-curl-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519446" comment="qemu-ipxe-1.0.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519447" comment="qemu-kvm-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519448" comment="qemu-seabios-1.10.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519449" comment="qemu-sgabios-8-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519450" comment="qemu-tools-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519451" comment="qemu-vgabios-1.10.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519452" comment="qemu-x86-2.9.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519438" comment="xen-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519439" comment="xen-libs-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519440" comment="xen-libs-32bit-4.9.0_11-3.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11446" ref_url="https://www.suse.com/security/cve/CVE-2017-11446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The ReadPESImage function in coders\pes.c in ImageMagick 7.0.6-1 has an infinite loop vulnerability that can cause CPU exhaustion via a crafted PES file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11446/">CVE-2017-11446</cve>
	<bugzilla href="https://bugzilla.suse.com/1049379">SUSE bug 1049379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11449" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11450" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via JPEG data that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2712-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00041.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518184" comment="krb5-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518185" comment="krb5-32bit-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518186" comment="krb5-client-1.12.5-40.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00042.html" source="SUSE-SU"/>
    <description>
    A SIGFPE is raised in the function box_blur_line of rsvg-filter.c in GNOME librsvg 2.40.17 during an attempted parse of a crafted SVG file, because of incorrect protection against division by zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<bugzilla href="https://bugzilla.suse.com/1049607">SUSE bug 1049607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009175785" comment="gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175787" comment="librsvg-2-2-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175788" comment="librsvg-2-2-32bit-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175789" comment="rsvg-view-2.40.20-5.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517997" comment="gdk-pixbuf-loader-rsvg-2.40.18-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517998" comment="librsvg-2-2-2.40.18-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517999" comment="librsvg-2-2-32bit-2.40.18-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518000" comment="rsvg-view-2.40.18-5.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11472" ref_url="https://www.suse.com/security/cve/CVE-2017-11472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11472/">CVE-2017-11472</cve>
	<bugzilla href="https://bugzilla.suse.com/1049580">SUSE bug 1049580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061680">SUSE bug 1061680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11478" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadOneDJVUImage function in coders/djvu.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed DJVU image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadOneJNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a malformed JNG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11522" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11522" ref_url="https://www.suse.com/security/cve/CVE-2017-11522" source="SUSE CVE"/>
    <description>
    The WriteOnePNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11522/">CVE-2017-11522</cve>
	<bugzilla href="https://bugzilla.suse.com/1050076">SUSE bug 1050076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11523" ref_url="https://www.suse.com/security/cve/CVE-2017-11523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11523/">CVE-2017-11523</cve>
	<bugzilla href="https://bugzilla.suse.com/1050083">SUSE bug 1050083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11524" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00013.html" source="SUSE-SU"/>
    <description>
    The WriteBlob function in MagickCore/blob.c in ImageMagick before 6.9.8-10 and 7.x before 7.6.0-0 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11525" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadCINImage function in coders/cin.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadOneMNGImage function in coders/png.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11527" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007482.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadDPXImage function in coders/dpx.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11528" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadDIBImage function in coders/dib.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11529" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    The ReadMATImage function in coders/mat.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11530" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadEPTImage function in coders/ept.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11531" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11531" ref_url="https://www.suse.com/security/cve/CVE-2017-11531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11531/">CVE-2017-11531</cve>
	<bugzilla href="https://bugzilla.suse.com/1050126">SUSE bug 1050126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11532" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050623">SUSE bug 1050623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520159" comment="ImageMagick-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520160" comment="libMagick++-6_Q16-3-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520162" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteUILImage() function in coders/uil.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11534" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the lite_font_map() function in coders/wmf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WritePSImage() function in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11536" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11536" ref_url="https://www.suse.com/security/cve/CVE-2017-11536" source="SUSE CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteJP2Image() function in coders/jp2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11536/">CVE-2017-11536</cve>
	<bugzilla href="https://bugzilla.suse.com/1050056">SUSE bug 1050056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11538" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11538" ref_url="https://www.suse.com/security/cve/CVE-2017-11538" source="SUSE CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteOnePNGImage() function in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11538/">CVE-2017-11538</cve>
	<bugzilla href="https://bugzilla.suse.com/1050043">SUSE bug 1050043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11539" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadOnePNGImage() function in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11540" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11540" ref_url="https://www.suse.com/security/cve/CVE-2017-11540" source="SUSE CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the GetPixelIndex() function, called from the WritePICONImage function in coders/xpm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11540/">CVE-2017-11540</cve>
	<bugzilla href="https://bugzilla.suse.com/1050144">SUSE bug 1050144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11545" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11545" ref_url="https://www.suse.com/security/cve/CVE-2017-11545" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11543. Reason: This candidate is a duplicate of CVE-2017-11543. Notes: All CVE users should reference CVE-2017-11543 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11545/">CVE-2017-11545</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333975" comment="tcpdump is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11550" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11550" ref_url="https://www.suse.com/security/cve/CVE-2017-11550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003823.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00067.html" source="SUSE-SU"/>
    <description>
    The id3_ucs4_length function in ucs4.c in libid3tag 0.15.1b allows remote attackers to cause a denial of service (NULL Pointer Dereference and application crash) via a crafted mp3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11550/">CVE-2017-11550</cve>
	<bugzilla href="https://bugzilla.suse.com/1081962">SUSE bug 1081962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173108" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519025" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11551" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11551" ref_url="https://www.suse.com/security/cve/CVE-2017-11551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003823.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00067.html" source="SUSE-SU"/>
    <description>
    The id3_field_parse function in field.c in libid3tag 0.15.1b allows remote attackers to cause a denial of service (OOM) via a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11551/">CVE-2017-11551</cve>
	<bugzilla href="https://bugzilla.suse.com/1081961">SUSE bug 1081961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173108" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519025" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11553" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11553" ref_url="https://www.suse.com/security/cve/CVE-2017-11553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the extend_alias_table function in localealias.c of Exiv2 0.26. A crafted input will lead to remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11553/">CVE-2017-11553</cve>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103870">SUSE bug 1103870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11591" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591</cve>
	<bugzilla href="https://bugzilla.suse.com/1050257">SUSE bug 1050257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11592" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11592" ref_url="https://www.suse.com/security/cve/CVE-2017-11592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a Mismatched Memory Management Routines vulnerability in the Exiv2::FileIo::seek function of Exiv2 0.26 that will lead to a remote denial of service attack (heap memory corruption) via crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11592/">CVE-2017-11592</cve>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103872">SUSE bug 1103872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096564">SUSE bug 1096564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520255" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520256" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11624" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after two consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11625" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDF::resolveObjectsInStream function in QPDF.cc, aka an "infinite loop."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11626" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after four consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11627" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the PointerHolder function in PointerHolder.hh, aka an "infinite loop."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11636" ref_url="https://www.suse.com/security/cve/CVE-2017-11636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00095.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a heap overflow in the WriteRGBImage() function in coders/rgb.c when processing multiple frames that have non-identical widths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11636/">CVE-2017-11636</cve>
	<bugzilla href="https://bugzilla.suse.com/1050674">SUSE bug 1050674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a NULL pointer dereference in the WritePCLImage() function in coders/pcl.c during writes of monochrome images.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637</cve>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a segmentation violation in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11642.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteCIPImage() function in coders/cip.c, related to the GetPixelLuma function in MagickCore/pixel-accessor.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to an address access exception in the WritePTIFImage() function in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11641" ref_url="https://www.suse.com/security/cve/CVE-2017-11641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a Memory Leak in the PersistCache function in magick/pixel_cache.c during writing of Magick Persistent Cache (MPC) files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11641/">CVE-2017-11641</cve>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050623">SUSE bug 1050623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a NULL pointer dereference in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11638.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11643" ref_url="https://www.suse.com/security/cve/CVE-2017-11643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00095.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a heap overflow in the WriteCMYKImage() function in coders/cmyk.c when processing multiple frames that have non-identical widths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11643/">CVE-2017-11643</cve>
	<bugzilla href="https://bugzilla.suse.com/1050611">SUSE bug 1050611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050674">SUSE bug 1050674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11644" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadMATImage() function in coders/mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2901-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00117.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512070" comment="cpp48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512071" comment="gcc48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512072" comment="gcc48-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512073" comment="gcc48-c++-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512074" comment="gcc48-gij-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512075" comment="gcc48-gij-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512076" comment="gcc48-info-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512077" comment="libasan0-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512078" comment="libasan0-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512079" comment="libgcj48-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512080" comment="libgcj48-32bit-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512081" comment="libgcj48-jar-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512082" comment="libgcj_bc1-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512083" comment="libstdc++48-devel-4.8.5-31.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512084" comment="libstdc++48-devel-32bit-4.8.5-31.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518105" comment="cpp48-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518106" comment="gcc48-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518107" comment="gcc48-32bit-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518108" comment="gcc48-c++-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518109" comment="gcc48-gij-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518110" comment="gcc48-gij-32bit-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518111" comment="gcc48-info-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518112" comment="libasan0-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518113" comment="libasan0-32bit-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518114" comment="libgcj48-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518115" comment="libgcj48-32bit-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518116" comment="libgcj48-jar-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518117" comment="libgcj_bc1-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518118" comment="libstdc++48-devel-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518119" comment="libstdc++48-devel-32bit-4.8.5-31.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11683" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11683" ref_url="https://www.suse.com/security/cve/CVE-2017-11683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp of Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11683/">CVE-2017-11683</cve>
	<bugzilla href="https://bugzilla.suse.com/1051188">SUSE bug 1051188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11695" ref_url="https://www.suse.com/security/cve/CVE-2017-11695" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11695/">CVE-2017-11695</cve>
	<bugzilla href="https://bugzilla.suse.com/1053418">SUSE bug 1053418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053419">SUSE bug 1053419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053420">SUSE bug 1053420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053422">SUSE bug 1053422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11696" ref_url="https://www.suse.com/security/cve/CVE-2017-11696" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the __hash_open function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11696/">CVE-2017-11696</cve>
	<bugzilla href="https://bugzilla.suse.com/1053418">SUSE bug 1053418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053419">SUSE bug 1053419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053420">SUSE bug 1053420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053422">SUSE bug 1053422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11697" ref_url="https://www.suse.com/security/cve/CVE-2017-11697" source="SUSE CVE"/>
    <description>
    The __hash_open function in hash.c:229 in Mozilla Network Security Services (NSS) allows context-dependent attackers to cause a denial of service (floating point exception and crash) via a crafted cert8.db file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11697/">CVE-2017-11697</cve>
	<bugzilla href="https://bugzilla.suse.com/1053418">SUSE bug 1053418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053419">SUSE bug 1053419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053420">SUSE bug 1053420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053422">SUSE bug 1053422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11698" ref_url="https://www.suse.com/security/cve/CVE-2017-11698" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11698/">CVE-2017-11698</cve>
	<bugzilla href="https://bugzilla.suse.com/1053418">SUSE bug 1053418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053419">SUSE bug 1053419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053420">SUSE bug 1053420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053422">SUSE bug 1053422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    psi/ztoken.c in Artifex Ghostscript 9.21 mishandles references to the scanner state structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11722" ref_url="https://www.suse.com/security/cve/CVE-2017-11722" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
    <description>
    The WriteOnePNGImage function in coders/png.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file, because the program's actual control flow was inconsistent with its indentation. This resulted in a logging statement executing outside of a loop, and consequently using an invalid array index corresponding to the loop's exit condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-11722/">CVE-2017-11722</cve>
	<bugzilla href="https://bugzilla.suse.com/1051411">SUSE bug 1051411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11724" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    The ReadMATImage function in coders/mat.c in ImageMagick through 6.9.9-3 and 7.x through 7.0.6-3 has memory leaks involving the quantum_info and clone_info data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadOneJNGImage function in coders/png.c in ImageMagick 6.9.9-4 and 7.0.6-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11751" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051416">SUSE bug 1051416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051430">SUSE bug 1051430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11752" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadMAGICKImage function in coders/magick.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11753" ref_url="https://www.suse.com/security/cve/CVE-2017-11753" source="SUSE CVE"/>
    <description>
    The GetImageDepth function in MagickCore/attribute.c in ImageMagick 7.0.6-4 might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted Flexible Image Transport System (FITS) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11753/">CVE-2017-11753</cve>
	<bugzilla href="https://bugzilla.suse.com/1052488">SUSE bug 1052488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518942" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518943" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518944" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518945" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518947" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518948" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518949" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003870.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0668-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518998" comment="glibc-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518999" comment="glibc-32bit-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519000" comment="glibc-devel-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519001" comment="glibc-devel-32bit-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519002" comment="glibc-i18ndata-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519003" comment="glibc-locale-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519004" comment="glibc-locale-32bit-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519005" comment="nscd-2.22-62.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12134" ref_url="https://www.suse.com/security/cve/CVE-2017-12134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12134/">CVE-2017-12134</cve>
	<bugzilla href="https://bugzilla.suse.com/1051790">SUSE bug 1051790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519438" comment="xen-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519439" comment="xen-libs-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519440" comment="xen-libs-32bit-4.9.0_11-3.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12136" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<bugzilla href="https://bugzilla.suse.com/1051789">SUSE bug 1051789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519438" comment="xen-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519439" comment="xen-libs-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519440" comment="xen-libs-32bit-4.9.0_11-3.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519438" comment="xen-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519439" comment="xen-libs-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519440" comment="xen-libs-32bit-4.9.0_11-3.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadDCMImage function in coders\dcm.c in ImageMagick 7.0.6-1 has an integer signedness error leading to excessive memory consumption via a crafted DCM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2706-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518296" comment="libdcerpc-atsvc0-4.2.4-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518140" comment="libdcerpc-binding0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518141" comment="libdcerpc-binding0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518142" comment="libdcerpc0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518143" comment="libdcerpc0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518144" comment="libndr-krb5pac0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518145" comment="libndr-krb5pac0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518146" comment="libndr-nbt0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518147" comment="libndr-nbt0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518148" comment="libndr-standard0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518149" comment="libndr-standard0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518150" comment="libndr0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518151" comment="libndr0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518152" comment="libnetapi0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518153" comment="libnetapi0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518154" comment="libsamba-credentials0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518155" comment="libsamba-credentials0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518156" comment="libsamba-errors0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518157" comment="libsamba-errors0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518158" comment="libsamba-hostconfig0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518159" comment="libsamba-hostconfig0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518160" comment="libsamba-passdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518161" comment="libsamba-passdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518162" comment="libsamba-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518163" comment="libsamba-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518164" comment="libsamdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518165" comment="libsamdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518166" comment="libsmbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518167" comment="libsmbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518168" comment="libsmbconf0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518169" comment="libsmbconf0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518170" comment="libsmbldap0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518171" comment="libsmbldap0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518172" comment="libtevent-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518173" comment="libtevent-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518174" comment="libwbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518175" comment="libwbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518176" comment="samba-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518177" comment="samba-client-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518178" comment="samba-client-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518179" comment="samba-doc-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518180" comment="samba-libs-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518181" comment="samba-libs-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518182" comment="samba-winbind-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518183" comment="samba-winbind-32bit-4.4.2-38.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519586" comment="libdcerpc-binding0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519587" comment="libdcerpc-binding0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519588" comment="libdcerpc0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519589" comment="libdcerpc0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519590" comment="libndr-krb5pac0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519591" comment="libndr-krb5pac0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519592" comment="libndr-nbt0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519593" comment="libndr-nbt0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519594" comment="libndr-standard0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519595" comment="libndr-standard0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519596" comment="libndr0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519597" comment="libndr0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519598" comment="libnetapi0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519599" comment="libnetapi0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519600" comment="libsamba-credentials0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519601" comment="libsamba-credentials0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519602" comment="libsamba-errors0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519603" comment="libsamba-errors0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519604" comment="libsamba-hostconfig0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519605" comment="libsamba-hostconfig0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519606" comment="libsamba-passdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519607" comment="libsamba-passdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519608" comment="libsamba-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519609" comment="libsamba-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519610" comment="libsamdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519611" comment="libsamdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519612" comment="libsmbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519613" comment="libsmbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519614" comment="libsmbconf0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519615" comment="libsmbconf0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519616" comment="libsmbldap0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519617" comment="libsmbldap0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519618" comment="libtevent-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519619" comment="libtevent-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519620" comment="libwbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519621" comment="libwbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519622" comment="samba-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519623" comment="samba-client-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519624" comment="samba-client-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519625" comment="samba-doc-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519626" comment="samba-libs-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519627" comment="samba-libs-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519628" comment="samba-winbind-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519629" comment="samba-winbind-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2706-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518296" comment="libdcerpc-atsvc0-4.2.4-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518140" comment="libdcerpc-binding0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518141" comment="libdcerpc-binding0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518142" comment="libdcerpc0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518143" comment="libdcerpc0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518144" comment="libndr-krb5pac0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518145" comment="libndr-krb5pac0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518146" comment="libndr-nbt0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518147" comment="libndr-nbt0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518148" comment="libndr-standard0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518149" comment="libndr-standard0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518150" comment="libndr0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518151" comment="libndr0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518152" comment="libnetapi0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518153" comment="libnetapi0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518154" comment="libsamba-credentials0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518155" comment="libsamba-credentials0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518156" comment="libsamba-errors0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518157" comment="libsamba-errors0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518158" comment="libsamba-hostconfig0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518159" comment="libsamba-hostconfig0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518160" comment="libsamba-passdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518161" comment="libsamba-passdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518162" comment="libsamba-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518163" comment="libsamba-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518164" comment="libsamdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518165" comment="libsamdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518166" comment="libsmbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518167" comment="libsmbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518168" comment="libsmbconf0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518169" comment="libsmbconf0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518170" comment="libsmbldap0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518171" comment="libsmbldap0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518172" comment="libtevent-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518173" comment="libtevent-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518174" comment="libwbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518175" comment="libwbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518176" comment="samba-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518177" comment="samba-client-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518178" comment="samba-client-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518179" comment="samba-doc-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518180" comment="samba-libs-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518181" comment="samba-libs-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518182" comment="samba-winbind-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518183" comment="samba-winbind-32bit-4.4.2-38.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519586" comment="libdcerpc-binding0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519587" comment="libdcerpc-binding0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519588" comment="libdcerpc0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519589" comment="libdcerpc0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519590" comment="libndr-krb5pac0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519591" comment="libndr-krb5pac0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519592" comment="libndr-nbt0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519593" comment="libndr-nbt0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519594" comment="libndr-standard0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519595" comment="libndr-standard0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519596" comment="libndr0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519597" comment="libndr0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519598" comment="libnetapi0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519599" comment="libnetapi0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519600" comment="libsamba-credentials0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519601" comment="libsamba-credentials0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519602" comment="libsamba-errors0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519603" comment="libsamba-errors0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519604" comment="libsamba-hostconfig0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519605" comment="libsamba-hostconfig0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519606" comment="libsamba-passdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519607" comment="libsamba-passdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519608" comment="libsamba-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519609" comment="libsamba-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519610" comment="libsamdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519611" comment="libsamdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519612" comment="libsmbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519613" comment="libsmbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519614" comment="libsmbconf0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519615" comment="libsmbconf0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519616" comment="libsmbldap0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519617" comment="libsmbldap0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519618" comment="libtevent-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519619" comment="libtevent-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519620" comment="libwbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519621" comment="libwbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519622" comment="samba-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519623" comment="samba-client-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519624" comment="samba-client-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519625" comment="samba-doc-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519626" comment="samba-libs-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519627" comment="samba-libs-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519628" comment="samba-winbind-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519629" comment="samba-winbind-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00019.html" source="SUSE-SU"/>
    <description>
    A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00019.html" source="SUSE-SU"/>
    <description>
    The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058507">SUSE bug 1058507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2706-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518296" comment="libdcerpc-atsvc0-4.2.4-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518140" comment="libdcerpc-binding0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518141" comment="libdcerpc-binding0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518142" comment="libdcerpc0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518143" comment="libdcerpc0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518144" comment="libndr-krb5pac0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518145" comment="libndr-krb5pac0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518146" comment="libndr-nbt0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518147" comment="libndr-nbt0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518148" comment="libndr-standard0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518149" comment="libndr-standard0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518150" comment="libndr0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518151" comment="libndr0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518152" comment="libnetapi0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518153" comment="libnetapi0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518154" comment="libsamba-credentials0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518155" comment="libsamba-credentials0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518156" comment="libsamba-errors0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518157" comment="libsamba-errors0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518158" comment="libsamba-hostconfig0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518159" comment="libsamba-hostconfig0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518160" comment="libsamba-passdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518161" comment="libsamba-passdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518162" comment="libsamba-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518163" comment="libsamba-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518164" comment="libsamdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518165" comment="libsamdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518166" comment="libsmbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518167" comment="libsmbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518168" comment="libsmbconf0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518169" comment="libsmbconf0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518170" comment="libsmbldap0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518171" comment="libsmbldap0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518172" comment="libtevent-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518173" comment="libtevent-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518174" comment="libwbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518175" comment="libwbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518176" comment="samba-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518177" comment="samba-client-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518178" comment="samba-client-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518179" comment="samba-doc-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518180" comment="samba-libs-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518181" comment="samba-libs-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518182" comment="samba-winbind-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518183" comment="samba-winbind-32bit-4.4.2-38.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519586" comment="libdcerpc-binding0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519587" comment="libdcerpc-binding0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519588" comment="libdcerpc0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519589" comment="libdcerpc0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519590" comment="libndr-krb5pac0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519591" comment="libndr-krb5pac0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519592" comment="libndr-nbt0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519593" comment="libndr-nbt0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519594" comment="libndr-standard0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519595" comment="libndr-standard0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519596" comment="libndr0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519597" comment="libndr0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519598" comment="libnetapi0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519599" comment="libnetapi0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519600" comment="libsamba-credentials0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519601" comment="libsamba-credentials0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519602" comment="libsamba-errors0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519603" comment="libsamba-errors0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519604" comment="libsamba-hostconfig0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519605" comment="libsamba-hostconfig0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519606" comment="libsamba-passdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519607" comment="libsamba-passdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519608" comment="libsamba-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519609" comment="libsamba-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519610" comment="libsamdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519611" comment="libsamdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519612" comment="libsmbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519613" comment="libsmbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519614" comment="libsmbconf0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519615" comment="libsmbconf0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519616" comment="libsmbldap0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519617" comment="libsmbldap0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519618" comment="libtevent-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519619" comment="libtevent-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519620" comment="libwbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519621" comment="libwbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519622" comment="samba-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519623" comment="samba-client-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519624" comment="samba-client-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519625" comment="samba-doc-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519626" comment="samba-libs-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519627" comment="samba-libs-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519628" comment="samba-winbind-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519629" comment="samba-winbind-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12164" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12164" ref_url="https://www.suse.com/security/cve/CVE-2017-12164" source="SUSE CVE"/>
    <description>
    A flaw was discovered in gdm 3.24.1 where gdm greeter was no longer setting the ran_once boolean during autologin. If autologin was enabled for a victim, an attacker could simply select 'login as another user' to unlock their screen.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12164/">CVE-2017-12164</cve>
	<bugzilla href="https://bugzilla.suse.com/1058136">SUSE bug 1058136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180206">SUSE bug 1180206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334029" comment="gdm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00082.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518237" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12172" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00039.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172</cve>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519164" comment="postgresql94-9.4.15-21.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12173" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2942-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00016.html" source="SUSE-SU"/>
    <description>
    It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173</cve>
	<bugzilla href="https://bugzilla.suse.com/1061832">SUSE bug 1061832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512322" comment="libipa_hbac0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512323" comment="libsss_certmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512324" comment="libsss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512325" comment="libsss_nss_idmap0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512326" comment="libsss_simpleifp0-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166514" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512327" comment="python-sssd-config-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512328" comment="sssd-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512329" comment="sssd-32bit-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512330" comment="sssd-ad-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512331" comment="sssd-ipa-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512332" comment="sssd-krb5-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512333" comment="sssd-krb5-common-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512334" comment="sssd-ldap-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512335" comment="sssd-proxy-1.16.1-2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512336" comment="sssd-tools-1.16.1-2.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518273" comment="libipa_hbac0-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518274" comment="libsss_idmap0-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518275" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518276" comment="python-sssd-config-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518277" comment="sssd-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518278" comment="sssd-32bit-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518279" comment="sssd-ad-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518280" comment="sssd-ipa-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518281" comment="sssd-krb5-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518282" comment="sssd-krb5-common-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518283" comment="sssd-ldap-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518284" comment="sssd-proxy-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518285" comment="sssd-tools-1.13.4-34.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518273" comment="libipa_hbac0-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518274" comment="libsss_idmap0-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519582" comment="libsss_nss_idmap0-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518275" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518276" comment="python-sssd-config-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518277" comment="sssd-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518278" comment="sssd-32bit-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518279" comment="sssd-ad-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518280" comment="sssd-ipa-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518281" comment="sssd-krb5-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518282" comment="sssd-krb5-common-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518283" comment="sssd-ldap-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518284" comment="sssd-proxy-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518285" comment="sssd-tools-1.13.4-34.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 DGA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 DRI extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFIXES extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XINERAMA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in MIT-SCREEN-SAVER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in X-Resource extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in RENDER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<bugzilla href="https://bugzilla.suse.com/1066192">SUSE bug 1066192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12194" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12194" ref_url="https://www.suse.com/security/cve/CVE-2017-12194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003873.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0892-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00011.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12194/">CVE-2017-12194</cve>
	<bugzilla href="https://bugzilla.suse.com/1085415">SUSE bug 1085415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512476" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512477" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512478" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512479" comment="libspice-controller0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512480" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512481" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520595" comment="libspice-client-glib-2_0-8-0.33-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520596" comment="libspice-client-glib-helper-0.33-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520597" comment="libspice-client-gtk-3_0-5-0.33-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520598" comment="libspice-controller0-0.33-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520599" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520600" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12374" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12376" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12377" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12424" ref_url="https://www.suse.com/security/cve/CVE-2017-12424" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003379.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00030.html" source="SUSE-SU"/>
    <description>
    In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12424/">CVE-2017-12424</cve>
	<bugzilla href="https://bugzilla.suse.com/1052261">SUSE bug 1052261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512619" comment="shadow-4.2.1-27.19.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518294" comment="shadow-4.2.1-27.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12427" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12428" ref_url="https://www.suse.com/security/cve/CVE-2017-12428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory leak vulnerability was found in the function ReadWMFImage in coders/wmf.c, which allows attackers to cause a denial of service in CloneDrawInfo in draw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12428/">CVE-2017-12428</cve>
	<bugzilla href="https://bugzilla.suse.com/1052249">SUSE bug 1052249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052253">SUSE bug 1052253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12429" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12430" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12431" ref_url="https://www.suse.com/security/cve/CVE-2017-12431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a use-after-free vulnerability was found in the function ReadWMFImage in coders/wmf.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12431/">CVE-2017-12431</cve>
	<bugzilla href="https://bugzilla.suse.com/1052249">SUSE bug 1052249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052253">SUSE bug 1052253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12433" ref_url="https://www.suse.com/security/cve/CVE-2017-12433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory leak vulnerability was found in the function ReadPESImage in coders/pes.c, which allows attackers to cause a denial of service, related to ResizeMagickMemory in memory.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12433/">CVE-2017-12433</cve>
	<bugzilla href="https://bugzilla.suse.com/1052545">SUSE bug 1052545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a missing NULL check vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service (assertion failure) in DestroyImageInfo in image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057508">SUSE bug 1057508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<bugzilla href="https://bugzilla.suse.com/1052518">SUSE bug 1052518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12450" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<bugzilla href="https://bugzilla.suse.com/1052514">SUSE bug 1052514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<bugzilla href="https://bugzilla.suse.com/1052511">SUSE bug 1052511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<bugzilla href="https://bugzilla.suse.com/1052509">SUSE bug 1052509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<bugzilla href="https://bugzilla.suse.com/1052507">SUSE bug 1052507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<bugzilla href="https://bugzilla.suse.com/1052503">SUSE bug 1052503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12562" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12562" ref_url="https://www.suse.com/security/cve/CVE-2017-12562" source="SUSE CVE"/>
    <description>
    Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12562/">CVE-2017-12562</cve>
	<bugzilla href="https://bugzilla.suse.com/1052476">SUSE bug 1052476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334031" comment="libsndfile is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12563" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12564" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12565" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadOneJNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12566" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMVGImage in coders/mvg.c, which allows attackers to cause a denial of service, related to the function ReadSVGImage in svg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a large loop vulnerability in the ReadPWPImage function in coders\pwp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12588" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12588" ref_url="https://www.suse.com/security/cve/CVE-2017-12588" source="SUSE CVE"/>
    <description>
    The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12588/">CVE-2017-12588</cve>
	<bugzilla href="https://bugzilla.suse.com/1051798">SUSE bug 1051798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote attackers to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as demonstrated by a crash in QPDFObjectHandle::parseInternal in libqpdf/QPDFObjectHandle.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00013.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it may result in denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172641" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172642" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172643" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518979" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518980" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518981" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12607" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12607" ref_url="https://www.suse.com/security/cve/CVE-2017-12607" source="SUSE CVE"/>
    <description>
    A vulnerability in OpenOffice's PPT file parser before 4.1.4, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-12607/">CVE-2017-12607</cve>
	<bugzilla href="https://bugzilla.suse.com/1065986">SUSE bug 1065986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333957" comment="libreoffice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12608" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12608" ref_url="https://www.suse.com/security/cve/CVE-2017-12608" source="SUSE CVE"/>
    <description>
    A vulnerability in Apache OpenOffice Writer DOC file parser before 4.1.4, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-12608/">CVE-2017-12608</cve>
	<bugzilla href="https://bugzilla.suse.com/1065982">SUSE bug 1065982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333957" comment="libreoffice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12642" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMPCImage in coders\mpc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12643" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory exhaustion vulnerability in ReadOneJNGImage in coders\png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12652" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006673.html" source="SUSE-SU"/>
    <description>
    libpng before 1.6.32 does not properly check the length of chunks against the user limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12654" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadPICTImage function in coders/pict.c in ImageMagick 7.0.6-3 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12662" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12663" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12664" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12665" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12667" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12668" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, missing validation was found in coders/mat.c, leading to an assertion failure in the function DestroyImage in MagickCore/image.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a missing NULL assignment was found in coders/png.c, leading to an invalid free in the function RelinquishMagickMemory in MagickCore/memory.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12672" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12673" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadOneMNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12674" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a CPU exhaustion vulnerability was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12675" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a missing check for multidimensional data was found in coders/mat.c, leading to a memory leak in the function ReadImage in MagickCore/constitute.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12676" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadOneJNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12678" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12678" ref_url="https://www.suse.com/security/cve/CVE-2017-12678" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2185-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00076.html" source="SUSE-SU"/>
    <description>
    In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12678/">CVE-2017-12678</cve>
	<bugzilla href="https://bugzilla.suse.com/1052699">SUSE bug 1052699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334033" comment="taglib is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12691" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    The ReadOneLayer function in coders/xcf.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082363">SUSE bug 1082363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12692" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12693" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The ReadBMPImage function in coders/bmp.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<bugzilla href="https://bugzilla.suse.com/1053347">SUSE bug 1053347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805</cve>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806</cve>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12809" ref_url="https://www.suse.com/security/cve/CVE-2017-12809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with the IDE disk and CD/DVD-ROM Emulator support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12809/">CVE-2017-12809</cve>
	<bugzilla href="https://bugzilla.suse.com/1054724">SUSE bug 1054724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519572" comment="qemu-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519573" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519575" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519578" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12814" ref_url="https://www.suse.com/security/cve/CVE-2017-12814" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-12814/">CVE-2017-12814</cve>
	<bugzilla href="https://bugzilla.suse.com/1057727">SUSE bug 1057727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12836" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003198.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00067.html" source="SUSE-SU"/>
    <description>
    CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052696">SUSE bug 1052696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052932">SUSE bug 1052932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054653">SUSE bug 1054653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066430">SUSE bug 1066430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071709">SUSE bug 1071709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009163575" comment="cvs-1.12.12-182.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518087" comment="cvs-1.12.12-182.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00083.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<bugzilla href="https://bugzilla.suse.com/1057724">SUSE bug 1057724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518319" comment="perl-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518320" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518321" comment="perl-base-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances, Xen will clear the status bits too early, incorrectly informing the guest that the grant is no longer in use. A guest may prematurely believe that a granted frame is safely private again, and reuse it in a way which contains sensitive information, while the domain on the far end of the grant is still using the grant. Xen 4.9, 4.8, 4.7, 4.6, and 4.5 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519438" comment="xen-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519439" comment="xen-libs-4.9.0_11-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519440" comment="xen-libs-32bit-4.9.0_11-3.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12858" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12858" ref_url="https://www.suse.com/security/cve/CVE-2017-12858" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the _zip_dirent_read function in zip_dirent.c in libzip allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12858/">CVE-2017-12858</cve>
	<bugzilla href="https://bugzilla.suse.com/1055377">SUSE bug 1055377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184178">SUSE bug 1184178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334034" comment="libzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12875" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12875" ref_url="https://www.suse.com/security/cve/CVE-2017-12875" source="SUSE CVE"/>
    <description>
    The WritePixelCachePixels function in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (CPU consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12875/">CVE-2017-12875</cve>
	<bugzilla href="https://bugzilla.suse.com/1056988">SUSE bug 1056988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12876" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12876" ref_url="https://www.suse.com/security/cve/CVE-2017-12876" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in enhance.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12876/">CVE-2017-12876</cve>
	<bugzilla href="https://bugzilla.suse.com/1054034">SUSE bug 1054034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12877" ref_url="https://www.suse.com/security/cve/CVE-2017-12877" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12877/">CVE-2017-12877</cve>
	<bugzilla href="https://bugzilla.suse.com/1054029">SUSE bug 1054029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00083.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<bugzilla href="https://bugzilla.suse.com/1057721">SUSE bug 1057721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518319" comment="perl-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518320" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518321" comment="perl-base-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12893" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The SMB/CIFS parser in tcpdump before 4.9.2 has a buffer over-read in smbutil.c:name_len().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12894" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12895" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12896" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12897" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:interp_reply().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12899" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in util-print.c:tok2strbuf().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12901" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12902" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 mishandles large MNG images, leading to an invalid memory read in the SetImageColorCallBack function in magick/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12944" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00061.html" source="SUSE-SU"/>
    <description>
    The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandles memory allocation for short files, which allows remote attackers to cause a denial of service (allocation failure and application crash) in the TIFFFetchStripThing function in tif_dirread.c during a tiff2pdf invocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944</cve>
	<bugzilla href="https://bugzilla.suse.com/1003874">SUSE bug 1003874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054594">SUSE bug 1054594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12955" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12955" ref_url="https://www.suse.com/security/cve/CVE-2017-12955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer overflow in basicio.cpp of Exiv2 0.26. The vulnerability causes an out-of-bounds write in Exiv2::Image::printIFDStructure(), which may lead to remote denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12955/">CVE-2017-12955</cve>
	<bugzilla href="https://bugzilla.suse.com/1054593">SUSE bug 1054593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12956" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12956" ref_url="https://www.suse.com/security/cve/CVE-2017-12956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in Exiv2::FileIo::path[abi:cxx11]() in basicio.cpp of libexiv2 in Exiv2 0.26 that will lead to remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12956/">CVE-2017-12956</cve>
	<bugzilla href="https://bugzilla.suse.com/1054592">SUSE bug 1054592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12957" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12957" ref_url="https://www.suse.com/security/cve/CVE-2017-12957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in libexiv2 in Exiv2 0.26 that is triggered in the Exiv2::Image::io function in image.cpp. It will lead to remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12957/">CVE-2017-12957</cve>
	<bugzilla href="https://bugzilla.suse.com/1054590">SUSE bug 1054590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12982" ref_url="https://www.suse.com/security/cve/CVE-2017-12982" source="SUSE CVE"/>
    <description>
    The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_malloc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12982/">CVE-2017-12982</cve>
	<bugzilla href="https://bugzilla.suse.com/1054696">SUSE bug 1054696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12985" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-ip6.c:ip6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12987" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12988" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12989" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12990" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12991" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12992" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12993" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12995" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12996" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The LLDP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-lldp.c:lldp_private_8021_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12998" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12999" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13000" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13001" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13002" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13003" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The LMP parser in tcpdump before 4.9.2 has a buffer over-read in print-lmp.c:lmp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13004" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13005" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13006" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The L2TP parser in tcpdump before 4.9.2 has a buffer over-read in print-l2tp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13007" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13008" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13009" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13010" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13011" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13012" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13013" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ARP parser in tcpdump before 4.9.2 has a buffer over-read in print-arp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13014" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The White Board protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-wb.c:wb_prep(), several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13015" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13016" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13017" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The DHCPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-dhcp6.c:dhcp6opt_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13018" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13019" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13020" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13021" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13022" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printroute().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13023" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13024" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13025" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13026" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13027" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13028" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13029" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:print_ccp_config_options().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13030" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PIM parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13031" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13032" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RADIUS parser in tcpdump before 4.9.2 has a buffer over-read in print-radius.c:print_attr_string().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13033" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13034" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13035" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_id().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13036" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The OSPFv3 parser in tcpdump before 4.9.2 has a buffer over-read in print-ospf6.c:ospf6_decode_v3().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13037" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13039" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13040" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The MPTCP parser in tcpdump before 4.9.2 has a buffer over-read in print-mptcp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_nodeinfo_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13043" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_multicast_vpn().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13044" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv4_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13045" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13046" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13047" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13048" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13049" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Rx protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-rx.c:ubik_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13050" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RPKI-Router parser in tcpdump before 4.9.2 has a buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13051" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13052" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The CFM parser in tcpdump before 4.9.2 has a buffer over-read in print-cfm.c:cfm_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13053" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13054" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_private_8023_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13055" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00040.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520238" comment="ImageMagick-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520239" comment="libMagick++-6_Q16-3-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520241" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13059" ref_url="https://www.suse.com/security/cve/CVE-2017-13059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WriteOneJNGImage in coders/png.c, which allows attackers to cause a denial of service (WriteJNGImage memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13059/">CVE-2017-13059</cve>
	<bugzilla href="https://bugzilla.suse.com/1055068">SUSE bug 1055068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-5, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-5, a length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function formatIPTC in coders/meta.c, which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055055">SUSE bug 1055055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13063" ref_url="https://www.suse.com/security/cve/CVE-2017-13063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c:314:12.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13063/">CVE-2017-13063</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055038">SUSE bug 1055038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055050">SUSE bug 1055050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13064" ref_url="https://www.suse.com/security/cve/CVE-2017-13064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00112.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c:311:12.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13064/">CVE-2017-13064</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055042">SUSE bug 1055042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055050">SUSE bug 1055050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13065" ref_url="https://www.suse.com/security/cve/CVE-2017-13065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a NULL pointer dereference vulnerability in the function SVGStartElement in coders/svg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13065/">CVE-2017-13065</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055038">SUSE bug 1055038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13066" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13066" ref_url="https://www.suse.com/security/cve/CVE-2017-13066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a memory leak vulnerability in the function CloneImage in magick/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13066/">CVE-2017-13066</cve>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055010">SUSE bug 1055010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178872">SUSE bug 1178872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512204" comment="kernel-firmware-20180525-3.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512205" comment="ucode-amd-20180525-3.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512204" comment="kernel-firmware-20180525-3.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512205" comment="ucode-amd-20180525-3.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00081.html" source="SUSE-SU"/>
    <description>
    The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089</cve>
	<bugzilla href="https://bugzilla.suse.com/1064715">SUSE bug 1064715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518255" comment="wget-1.14-21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00081.html" source="SUSE-SU"/>
    <description>
    The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090</cve>
	<bugzilla href="https://bugzilla.suse.com/1064716">SUSE bug 1064716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518255" comment="wget-1.14-21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-8, a memory leak vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (memory consumption in NewLinkedList in MagickCore/linked-list.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13132" ref_url="https://www.suse.com/security/cve/CVE-2017-13132" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.6-8, the WritePDFImage function in coders/pdf.c operates on an incorrect data structure in the "dump uncompressed PseudoColor packets" step, which allows attackers to cause a denial of service (assertion failure in WriteBlobStream in MagickCore/blob.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13132/">CVE-2017-13132</cve>
	<bugzilla href="https://bugzilla.suse.com/1055226">SUSE bug 1055226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13133" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-8, the load_level function in coders/xcf.c lacks offset validation, which allows attackers to cause a denial of service (load_tile memory exhaustion) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6 and GraphicsMagick 1.3.26, a heap-based buffer over-read was found in the function SFWScan in coders/sfw.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13140" ref_url="https://www.suse.com/security/cve/CVE-2017-13140" source="SUSE CVE"/>
    <description>
    In ImageMagick before 6.9.9-1 and 7.x before 7.0.6-2, the ReadOnePNGImage function in coders/png.c allows remote attackers to cause a denial of service (application hang in LockSemaphoreInfo) via a PNG file with a width equal to MAGICK_WIDTH_LIMIT.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13140/">CVE-2017-13140</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055458">SUSE bug 1055458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.9-4 and 7.x before 7.0.6-4, a crafted file could trigger a memory leak in ReadOnePNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, a crafted PNG file could trigger a crash because there was an insufficient check for short files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13144" ref_url="https://www.suse.com/security/cve/CVE-2017-13144" source="SUSE CVE"/>
    <description>
    In ImageMagick before 6.9.7-10, there is a crash (rather than a "width or height exceeds limit" error report) if the image dimensions are too large, as demonstrated by use of the mpc coder.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13144/">CVE-2017-13144</cve>
	<bugzilla href="https://bugzilla.suse.com/1055437">SUSE bug 1055437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13145" ref_url="https://www.suse.com/security/cve/CVE-2017-13145" source="SUSE CVE"/>
    <description>
    In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13145/">CVE-2017-13145</cve>
	<bugzilla href="https://bugzilla.suse.com/1055464">SUSE bug 1055464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13146" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.8-5 and 7.x before 7.0.5-6, there is a memory leak in the ReadMATImage function in coders/mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13147" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.3.26, an allocation failure vulnerability was found in the function ReadMNGImage in coders/png.c when a small MNG file has a MEND chunk with a large length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13167" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167</cve>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13194" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00088.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the Android media framework (libvpx) related to odd frame width. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64710201.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<bugzilla href="https://bugzilla.suse.com/1075992">SUSE bug 1075992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009169974" comment="libvpx1-1.3.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169975" comment="libvpx1-32bit-1.3.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169976" comment="vpx-tools-1.3.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518765" comment="libvpx1-1.3.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518766" comment="libvpx1-32bit-1.3.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518767" comment="vpx-tools-1.3.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13215" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
    <description>
    A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13220" ref_url="https://www.suse.com/security/cve/CVE-2017-13220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13220/">CVE-2017-13220</cve>
	<bugzilla href="https://bugzilla.suse.com/1076537">SUSE bug 1076537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13221" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13221" ref_url="https://www.suse.com/security/cve/CVE-2017-13221" source="SUSE CVE"/>
    <description>
    An elevation of privilege vulnerability in the Upstream kernel wifi driver. Product: Android. Versions: Android kernel. Android ID: A-64709938.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-13221/">CVE-2017-13221</cve>
	<bugzilla href="https://bugzilla.suse.com/1076600">SUSE bug 1076600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13648" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.3.26, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13658" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.9-3 and 7.x before 7.0.6-3, there is a missing NULL check in the ReadMATImage function in coders/mat.c, leading to a denial of service (assertion failure and application exit) in the DestroyImageInfo function in MagickCore/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13673" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<bugzilla href="https://bugzilla.suse.com/1056386">SUSE bug 1056386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056387">SUSE bug 1056387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13685" ref_url="https://www.suse.com/security/cve/CVE-2017-13685" source="SUSE CVE"/>
    <description>
    The dump_callback function in SQLite 3.20.0 allows remote attackers to cause a denial of service (EXC_BAD_ACCESS and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13685/">CVE-2017-13685</cve>
	<bugzilla href="https://bugzilla.suse.com/1056541">SUSE bug 1056541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13687" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13688" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The OLSR parser in tcpdump before 4.9.2 has a buffer over-read in print-olsr.c:olsr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13689" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IKEv1 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:ikev1_id_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13690" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IKEv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13693" ref_url="https://www.suse.com/security/cve/CVE-2017-13693" source="SUSE CVE"/>
    <description>
    The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-27"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13693/">CVE-2017-13693</cve>
	<bugzilla href="https://bugzilla.suse.com/1055713">SUSE bug 1055713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13694" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13694" ref_url="https://www.suse.com/security/cve/CVE-2017-13694" source="SUSE CVE"/>
    <description>
    The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-27"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13694/">CVE-2017-13694</cve>
	<bugzilla href="https://bugzilla.suse.com/1055705">SUSE bug 1055705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13704" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13704" ref_url="https://www.suse.com/security/cve/CVE-2017-13704" source="SUSE CVE"/>
    <description>
    In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-13704/">CVE-2017-13704</cve>
	<bugzilla href="https://bugzilla.suse.com/1060586">SUSE bug 1060586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338972" comment="dnsmasq is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711</cve>
	<bugzilla href="https://bugzilla.suse.com/1056291">SUSE bug 1056291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519572" comment="qemu-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519573" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519575" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519578" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3256-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00005.html" source="SUSE-SU"/>
    <description>
    In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518822" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
    <description>
    In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3256-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00005.html" source="SUSE-SU"/>
    <description>
    In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518822" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
    <description>
    In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13725" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13726" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13726" ref_url="https://www.suse.com/security/cve/CVE-2017-13726" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
    <description>
    There is a reachable assertion abort in the function TIFFWriteDirectorySec() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13726/">CVE-2017-13726</cve>
	<bugzilla href="https://bugzilla.suse.com/1056176">SUSE bug 1056176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092949">SUSE bug 1092949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519749" comment="libtiff5-4.0.9-44.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519750" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734</cve>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13735" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00007.html" source="SUSE-SU"/>
    <description>
    There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735</cve>
	<bugzilla href="https://bugzilla.suse.com/1056170">SUSE bug 1056170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060321">SUSE bug 1060321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518408" comment="libraw9-0.15.4-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13738" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the _lou_getALine function in compileTranslationTable.c:346 in Liblouis 3.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738</cve>
	<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518133" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518134" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518135" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13739" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer overflow that causes a more than two thousand bytes out-of-bounds write in Liblouis 3.2.0, triggered in the function resolveSubtable() in compileTranslationTable.c. It will lead to denial of service or remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518133" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518134" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518135" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13740" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function parseChars() in compileTranslationTable.c, that will lead to denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518133" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518134" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518135" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13741" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free in the function compileBrailleIndicator() in compileTranslationTable.c in Liblouis 3.2.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518133" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518134" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518135" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13743" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is a buffer overflow in Liblouis 3.2.0, triggered in the function _lou_showString() in utils.c, that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518133" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518134" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518135" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13744" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function _lou_getALine() in compileTranslationTable.c:343 in Liblouis 3.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744</cve>
	<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518133" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518134" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518135" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13745" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13745" ref_url="https://www.suse.com/security/cve/CVE-2017-13745" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_dec_process_sot() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack by triggering an unexpected jpc_ppmstabtostreams return value, a different vulnerability than CVE-2018-9154.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13745/">CVE-2017-13745</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056069">SUSE bug 1056069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13746" ref_url="https://www.suse.com/security/cve/CVE-2017-13746" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_dec_process_siz() in jpc/jpc_dec.c:1297 in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13746/">CVE-2017-13746</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056068">SUSE bug 1056068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13747" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13747" ref_url="https://www.suse.com/security/cve/CVE-2017-13747" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_floorlog2() in jpc/jpc_math.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13747/">CVE-2017-13747</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056067">SUSE bug 1056067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13748" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13748" ref_url="https://www.suse.com/security/cve/CVE-2017-13748" source="SUSE CVE"/>
    <description>
    There are lots of memory leaks in JasPer 2.0.12, triggered in the function jas_strdup() in base/jas_string.c, that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13748/">CVE-2017-13748</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056066">SUSE bug 1056066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13749" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13749" ref_url="https://www.suse.com/security/cve/CVE-2017-13749" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_pi_nextrpcl() in jpc/jpc_t2cod.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13749/">CVE-2017-13749</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056065">SUSE bug 1056065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13750" ref_url="https://www.suse.com/security/cve/CVE-2017-13750" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_dec_process_siz() in jpc/jpc_dec.c:1296 in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13750/">CVE-2017-13750</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056064">SUSE bug 1056064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13751" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13751" ref_url="https://www.suse.com/security/cve/CVE-2017-13751" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function calcstepsizes() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13751/">CVE-2017-13751</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056063">SUSE bug 1056063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13752" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13752" ref_url="https://www.suse.com/security/cve/CVE-2017-13752" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_dequantize() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13752/">CVE-2017-13752</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056062">SUSE bug 1056062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13753" ref_url="https://www.suse.com/security/cve/CVE-2017-13753" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-9396.  Reason: This candidate is a duplicate of CVE-2016-9396.  Notes: All CVE users should reference CVE-2016-9396 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13753/">CVE-2017-13753</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056060">SUSE bug 1056060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082397">SUSE bug 1082397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13757" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<bugzilla href="https://bugzilla.suse.com/1056312">SUSE bug 1056312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-10, there is a heap-based buffer overflow in the TracePoint() function in MagickCore/draw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096261">SUSE bug 1096261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13764" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13764" ref_url="https://www.suse.com/security/cve/CVE-2017-13764" source="SUSE CVE"/>
    <description>
    In Wireshark 2.4.0, the Modbus dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/packet-mbtcp.c by adding length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13764/">CVE-2017-13764</cve>
	<bugzilla href="https://bugzilla.suse.com/1056250">SUSE bug 1056250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13765" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00008.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518125" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518126" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518127" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518128" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518129" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518130" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13766" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00008.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518125" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518126" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518127" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518128" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518129" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518130" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13767" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00008.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the MSDP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-msdp.c by adding length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518125" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518126" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518127" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518128" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518129" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518130" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13768" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    Null Pointer Dereference in the IdentifyImage function in MagickCore/identify.c in ImageMagick through 7.0.6-10 allows an attacker to perform denial of service by sending a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The WriteTHUMBNAILImage function in coders/thumbnail.c in ImageMagick through 7.0.6-10 allows an attacker to cause a denial of service (buffer over-read) by sending a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13775" ref_url="https://www.suse.com/security/cve/CVE-2017-13775" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00112.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a denial of service issue in ReadJNXImage() in coders/jnx.c whereby large amounts of CPU and memory resources may be consumed although the file itself does not support the requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13775/">CVE-2017-13775</cve>
	<bugzilla href="https://bugzilla.suse.com/1056431">SUSE bug 1056431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13777" ref_url="https://www.suse.com/security/cve/CVE-2017-13777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00048.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a denial of service issue in ReadXBMImage() in a coders/xbm.c "Read hex image data" version==10 case that results in the reader not returning; it would cause large amounts of CPU and memory consumption although the crafted file itself does not request it.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13777/">CVE-2017-13777</cve>
	<bugzilla href="https://bugzilla.suse.com/1056426">SUSE bug 1056426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13788" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13797" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13797" ref_url="https://www.suse.com/security/cve/CVE-2017-13797" source="SUSE CVE"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13797/">CVE-2017-13797</cve>
	<bugzilla href="https://bugzilla.suse.com/1074985">SUSE bug 1074985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338973" comment="webkit2gtk3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13798" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13803" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13856" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13866" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13870" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13884" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884</cve>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13885" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885</cve>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was discovered in the opj_t2_encode_packet function in lib/openjp2/t2.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039</cve>
	<bugzilla href="https://bugzilla.suse.com/1056622">SUSE bug 1056622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518139" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    An invalid write access was discovered in bin/jp2/convert.c in OpenJPEG 2.2.0, triggering a crash in the tgatoimage function. The vulnerability may lead to remote denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040</cve>
	<bugzilla href="https://bugzilla.suse.com/1056621">SUSE bug 1056621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518139" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041</cve>
	<bugzilla href="https://bugzilla.suse.com/1056562">SUSE bug 1056562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518139" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c in GraphicsMagick 1.3.26. The vulnerability causes a big memory allocation, which may lead to remote denial of service in the MagickRealloc function in magick/memory.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059721">SUSE bug 1059721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14051" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14060" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14060" ref_url="https://www.suse.com/security/cve/CVE-2017-14060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-10, a NULL Pointer Dereference issue is present in the ReadCUTImage function in coders/cut.c that could allow an attacker to cause a Denial of Service (in the QueueAuthenticPixelCacheNexus function within the MagickCore/cache.c file) by submitting a malformed image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14060/">CVE-2017-14060</cve>
	<bugzilla href="https://bugzilla.suse.com/1056768">SUSE bug 1056768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14061" ref_url="https://www.suse.com/security/cve/CVE-2017-14061" source="SUSE CVE"/>
    <description>
    Integer overflow in the _isBidi function in bidi.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14061/">CVE-2017-14061</cve>
	<bugzilla href="https://bugzilla.suse.com/1056451">SUSE bug 1056451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338974" comment="libidn is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0891-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087709">SUSE bug 1087709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123123">SUSE bug 1123123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174162" comment="libidn11-1.28-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174163" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520601" comment="libidn11-1.28-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520602" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14103" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-11403.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2550-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00096.html" source="SUSE-SU"/>
    <description>
    The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107</cve>
	<bugzilla href="https://bugzilla.suse.com/1056996">SUSE bug 1056996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164531" comment="libzip2-0.11.1-13.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518124" comment="libzip2-0.11.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14120" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14120" ref_url="https://www.suse.com/security/cve/CVE-2017-14120" source="SUSE CVE"/>
    <description>
    unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14120/">CVE-2017-14120</cve>
	<bugzilla href="https://bugzilla.suse.com/1057003">SUSE bug 1057003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14121" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14121" ref_url="https://www.suse.com/security/cve/CVE-2017-14121" source="SUSE CVE"/>
    <description>
    The DecodeNumber function in unrarlib.c in unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a NULL pointer dereference flaw triggered by a crafted RAR archive. NOTE: this may be the same as one of the several test cases in the CVE-2017-11189 references.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14121/">CVE-2017-14121</cve>
	<bugzilla href="https://bugzilla.suse.com/1057004">SUSE bug 1057004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14122" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14122" ref_url="https://www.suse.com/security/cve/CVE-2017-14122" source="SUSE CVE"/>
    <description>
    unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14122/">CVE-2017-14122</cve>
	<bugzilla href="https://bugzilla.suse.com/1057005">SUSE bug 1057005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<bugzilla href="https://bugzilla.suse.com/1057139">SUSE bug 1057139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<bugzilla href="https://bugzilla.suse.com/1057144">SUSE bug 1057144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<bugzilla href="https://bugzilla.suse.com/1057149">SUSE bug 1057149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14137" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14137" ref_url="https://www.suse.com/security/cve/CVE-2017-14137" source="SUSE CVE"/>
    <description>
    ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14137/">CVE-2017-14137</cve>
	<bugzilla href="https://bugzilla.suse.com/1057153">SUSE bug 1057153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057157">SUSE bug 1057157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14138" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14138" ref_url="https://www.suse.com/security/cve/CVE-2017-14138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-5 has a memory leak vulnerability in ReadWEBPImage in coders/webp.c because memory is not freed in certain error cases, as demonstrated by VP8 errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14138/">CVE-2017-14138</cve>
	<bugzilla href="https://bugzilla.suse.com/1057153">SUSE bug 1057153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057157">SUSE bug 1057157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14139" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14139" ref_url="https://www.suse.com/security/cve/CVE-2017-14139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMSLImage in coders/msl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14139/">CVE-2017-14139</cve>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
    <description>
    The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-27"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140</cve>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14151" ref_url="https://www.suse.com/security/cve/CVE-2017-14151" source="SUSE CVE"/>
    <description>
    An off-by-one error was discovered in opj_tcd_code_block_enc_allocate_data in lib/openjp2/tcd.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_mqc_flush in lib/openjp2/mqc.c and opj_t1_encode_cblk in lib/openjp2/t1.c) or possibly remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14151/">CVE-2017-14151</cve>
	<bugzilla href="https://bugzilla.suse.com/1057336">SUSE bug 1057336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14152" ref_url="https://www.suse.com/security/cve/CVE-2017-14152" source="SUSE CVE"/>
    <description>
    A mishandled zero case was discovered in opj_j2k_set_cinema_parameters in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c and opj_j2k_write_sot in lib/openjp2/j2k.c) or possibly remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14152/">CVE-2017-14152</cve>
	<bugzilla href="https://bugzilla.suse.com/1057335">SUSE bug 1057335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14156" ref_url="https://www.suse.com/security/cve/CVE-2017-14156" source="SUSE CVE"/>
    <description>
    The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14156/">CVE-2017-14156</cve>
	<bugzilla href="https://bugzilla.suse.com/1057347">SUSE bug 1057347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00084.html" source="SUSE-SU"/>
    <description>
    The bark_noise_hybridmp function in psy.c in Xiph.Org libvorbis 1.3.5 allows remote attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520959" comment="libvorbis0-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520960" comment="libvorbis0-32bit-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520961" comment="libvorbisenc2-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520962" comment="libvorbisenc2-32bit-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520963" comment="libvorbisfile3-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520964" comment="libvorbisfile3-32bit-1.3.3-10.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14164" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    A size-validation issue was discovered in opj_j2k_write_sot in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c) or possibly remote code execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-14152.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164</cve>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518139" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166</cve>
	<bugzilla href="https://bugzilla.suse.com/1057514">SUSE bug 1057514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519572" comment="qemu-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519573" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519575" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519578" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14173" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In the function ReadTXTImage() in coders/txt.c in ImageMagick 7.0.6-10, an integer overflow might occur for the addition operation "GetQuantumRange(depth)+1" when "depth" is large, producing a smaller value than expected. As a result, an infinite loop would occur for a crafted TXT file that claims a very large "max_value" value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14174" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<bugzilla href="https://bugzilla.suse.com/1056426">SUSE bug 1056426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056429">SUSE bug 1056429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in WritePCXImage in coders/pcx.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service or code execution via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14226" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14226" ref_url="https://www.suse.com/security/cve/CVE-2017-14226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00009.html" source="SUSE-SU"/>
    <description>
    WP1StylesListener.cpp, WP5StylesListener.cpp, and WP42StylesListener.cpp in libwpd 0.10.1 mishandle iterators, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the WPXTableList class in WPXTable.cpp). This vulnerability can be triggered in LibreOffice before 5.3.7. It may lead to suffering a remote attack against a LibreOffice application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14226/">CVE-2017-14226</cve>
	<bugzilla href="https://bugzilla.suse.com/1058025">SUSE bug 1058025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166502" comment="libwpd-0_10-10-0.10.2-2.4.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518263" comment="libwpd-0_10-10-0.10.2-2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14229" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14229" ref_url="https://www.suse.com/security/cve/CVE-2017-14229" source="SUSE CVE"/>
    <description>
    There is an infinite loop in the jpc_dec_tileinit function in jpc/jpc_dec.c of Jasper 2.0.13. It will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14229/">CVE-2017-14229</cve>
	<bugzilla href="https://bugzilla.suse.com/1058000">SUSE bug 1058000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14245" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518830" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518831" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14246" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518830" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518831" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14248" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14248" ref_url="https://www.suse.com/security/cve/CVE-2017-14248" source="SUSE CVE"/>
    <description>
    A heap-based buffer over-read in SampleImage() in MagickCore/resize.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14248/">CVE-2017-14248</cve>
	<bugzilla href="https://bugzilla.suse.com/1058220">SUSE bug 1058220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-8 Q16 mishandles EOF checks in ReadMPCImage in coders/mpc.c, leading to division by zero in GetPixelCacheTileSize in MagickCore/cache.c, allowing remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14265" ref_url="https://www.suse.com/security/cve/CVE-2017-14265" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00007.html" source="SUSE-SU"/>
    <description>
    A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14265/">CVE-2017-14265</cve>
	<bugzilla href="https://bugzilla.suse.com/1060163">SUSE bug 1060163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084688">SUSE bug 1084688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084690">SUSE bug 1084690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084691">SUSE bug 1084691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the DrawImage function in magick/render.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00078.html" source="SUSE-SU"/>
    <description>
    A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the function checks to see if the special constant `NUMA_NO_NODE` is specified, it otherwise does not handle the case where `node &gt;= MAX_NUMNODES`. This allows an out-of-bounds access to an internal array.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519453" comment="xen-4.9.0_12-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519454" comment="xen-libs-4.9.0_12-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519455" comment="xen-libs-32bit-4.9.0_12-3.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00078.html" source="SUSE-SU"/>
    <description>
    A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on it (including domain creation / destruction, ballooning, device changes, etc.).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519453" comment="xen-4.9.0_12-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519454" comment="xen-libs-4.9.0_12-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519455" comment="xen-libs-32bit-4.9.0_12-3.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14318" ref_url="https://www.suse.com/security/cve/CVE-2017-14318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00078.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.5.x through 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table is checked to see if a grant mapping to the calling domain exists for the page in question. However, the function does not check to see if the owning domain actually has a grant table or not. Some special domains, such as `DOMID_XEN`, `DOMID_IO` and `DOMID_COW` are created without grant tables. Hence, if __gnttab_cache_flush operates on a page owned by these special domains, it will attempt to dereference a NULL pointer in the domain struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14318/">CVE-2017-14318</cve>
	<bugzilla href="https://bugzilla.suse.com/1056280">SUSE bug 1056280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519453" comment="xen-4.9.0_12-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519454" comment="xen-libs-4.9.0_12-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519455" comment="xen-libs-32bit-4.9.0_12-3.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00078.html" source="SUSE-SU"/>
    <description>
    A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neither the presence of the mapping nor page writability were taken into account.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519453" comment="xen-4.9.0_12-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519454" comment="xen-libs-4.9.0_12-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519455" comment="xen-libs-32bit-4.9.0_12-3.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14325" ref_url="https://www.suse.com/security/cve/CVE-2017-14325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function PersistPixelCache in magick/cache.c, which allows attackers to cause a denial of service (memory consumption in ReadMPCImage in coders/mpc.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14325/">CVE-2017-14325</cve>
	<bugzilla href="https://bugzilla.suse.com/1058635">SUSE bug 1058635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14333" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<bugzilla href="https://bugzilla.suse.com/1058480">SUSE bug 1058480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14341" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-6 has a large loop vulnerability in ReadWPGImage in coders/wpg.c, causing CPU exhaustion via a crafted wpg image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-6 has a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c via a crafted wpg image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-6 has a memory leak vulnerability in ReadXCFImage in coders/xcf.c via a crafted xcf image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082363">SUSE bug 1082363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14348" ref_url="https://www.suse.com/security/cve/CVE-2017-14348" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2559-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00099.html" source="SUSE-SU"/>
    <description>
    LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14348/">CVE-2017-14348</cve>
	<bugzilla href="https://bugzilla.suse.com/1058467">SUSE bug 1058467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063798">SUSE bug 1063798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334040" comment="dcraw is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14400" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14400" ref_url="https://www.suse.com/security/cve/CVE-2017-14400" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, the PersistPixelCache function in magick/cache.c mishandles the pixel cache nexus, which allows remote attackers to cause a denial of service (NULL pointer dereference in the function GetVirtualPixels in MagickCore/cache.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14400/">CVE-2017-14400</cve>
	<bugzilla href="https://bugzilla.suse.com/1058435">SUSE bug 1058435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00077.html" source="SUSE-SU"/>
    <description>
    GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518120" comment="emacs-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518121" comment="emacs-info-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518122" comment="emacs-x11-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518123" comment="etags-24.3-25.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00019.html" source="SUSE-SU"/>
    <description>
    The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (panic) by leveraging incorrect length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143944">SUSE bug 1143944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518138" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518138" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518138" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518138" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518138" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518138" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw exists in parse_file_info in archive_read_support_format_iso9660.c in libarchive 3.3.2 when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501</cve>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502</cve>
	<bugzilla href="https://bugzilla.suse.com/1059134">SUSE bug 1059134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503</cve>
	<bugzilla href="https://bugzilla.suse.com/1059100">SUSE bug 1059100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    DrawGetStrokeDashArray in wand/drawing-wand.c in ImageMagick 7.0.7-1 mishandles certain NULL arrays, which allows attackers to perform Denial of Service (NULL pointer dereference and application crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image File as input.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in the XRef::parseEntry() function in XRef.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<bugzilla href="https://bugzilla.suse.com/1059066">SUSE bug 1059066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518295" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a floating point exception exists in the isImageInterpolationRequired() function in Splash.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<bugzilla href="https://bugzilla.suse.com/1059101">SUSE bug 1059101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518295" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14520" ref_url="https://www.suse.com/security/cve/CVE-2017-14520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a floating point exception occurs in Splash::scaleImageYuXd() in Splash.cc, which may lead to a potential attack when handling malicious PDF files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14520/">CVE-2017-14520</cve>
	<bugzilla href="https://bugzilla.suse.com/1059155">SUSE bug 1059155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518295" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14529" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-0 has a memory exhaustion issue in ReadSUNImage in coders/sun.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<bugzilla href="https://bugzilla.suse.com/1057508">SUSE bug 1057508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14532" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14532" ref_url="https://www.suse.com/security/cve/CVE-2017-14532" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00049.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-0 has a NULL Pointer Dereference in TIFFIgnoreTags in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14532/">CVE-2017-14532</cve>
	<bugzilla href="https://bugzilla.suse.com/1059663">SUSE bug 1059663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-6 has a memory leak in ReadMATImage in coders/mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14604" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00011.html" source="SUSE-SU"/>
    <description>
    GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604</cve>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512172" comment="gnome-shell-search-provider-nautilus-3.20.3-23.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512173" comment="libnautilus-extension1-3.20.3-23.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512174" comment="libnautilus-extension1-32bit-3.20.3-23.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512175" comment="nautilus-3.20.3-23.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512176" comment="nautilus-lang-3.20.3-23.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519816" comment="gnome-shell-search-provider-nautilus-3.20.3-23.3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519817" comment="libnautilus-extension1-3.20.3-23.3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519818" comment="libnautilus-extension1-32bit-3.20.3-23.3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519819" comment="nautilus-3.20.3-23.3.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519820" comment="nautilus-lang-3.20.3-23.3.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-4 Q16, an out of bounds read flaw related to ReadTIFFImage has been reported in coders/tiff.c. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14608" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14608" ref_url="https://www.suse.com/security/cve/CVE-2017-14608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00089.html" source="SUSE-SU"/>
    <description>
    In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14608/">CVE-2017-14608</cve>
	<bugzilla href="https://bugzilla.suse.com/1063798">SUSE bug 1063798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518408" comment="libraw9-0.15.4-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14617" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14617" ref_url="https://www.suse.com/security/cve/CVE-2017-14617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a floating point exception occurs in the ImageStream class in Stream.cc, which may lead to a potential attack when handling malicious PDF files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14617/">CVE-2017-14617</cve>
	<bugzilla href="https://bugzilla.suse.com/1060220">SUSE bug 1060220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14624" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14624" ref_url="https://www.suse.com/security/cve/CVE-2017-14624" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function PostscriptDelegateMessage in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14624/">CVE-2017-14624</cve>
	<bugzilla href="https://bugzilla.suse.com/1059772">SUSE bug 1059772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14625" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14625" ref_url="https://www.suse.com/security/cve/CVE-2017-14625" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_output_create in coders/sixel.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14625/">CVE-2017-14625</cve>
	<bugzilla href="https://bugzilla.suse.com/1059770">SUSE bug 1059770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14626" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14626" ref_url="https://www.suse.com/security/cve/CVE-2017-14626" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_decode in coders/sixel.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14626/">CVE-2017-14626</cve>
	<bugzilla href="https://bugzilla.suse.com/1059767">SUSE bug 1059767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14632" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00015.html" source="SUSE-SU"/>
    <description>
    Xiph.Org libvorbis 1.3.5 allows Remote Code Execution upon freeing uninitialized memory in the function vorbis_analysis_headerout() in info.c when vi-&gt;channels&lt;=0, a similar issue to Mozilla bug 550184.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518785" comment="libvorbis0-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518786" comment="libvorbis0-32bit-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518787" comment="libvorbisenc2-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518788" comment="libvorbisenc2-32bit-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518789" comment="libvorbisfile3-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518790" comment="libvorbisfile3-32bit-1.3.3-10.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14633" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00015.html" source="SUSE-SU"/>
    <description>
    In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read vulnerability exists in the function mapping0_forward() in mapping0.c, which may lead to DoS when operating on a crafted audio file with vorbis_analysis().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081833">SUSE bug 1081833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518785" comment="libvorbis0-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518786" comment="libvorbis0-32bit-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518787" comment="libvorbisenc2-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518788" comment="libvorbisenc2-32bit-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518789" comment="libvorbisfile3-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518790" comment="libvorbisfile3-32bit-1.3.3-10.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14634" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518830" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518831" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14649" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ReadOneJNGImage in coders/png.c in GraphicsMagick version 1.3.26 does not properly validate JNG data, leading to a denial of service (assertion failure in magick/pixel_cache.c, and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14682" ref_url="https://www.suse.com/security/cve/CVE-2017-14682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted SVG document, a different vulnerability than CVE-2017-10928.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14682/">CVE-2017-14682</cve>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14684" ref_url="https://www.suse.com/security/cve/CVE-2017-14684" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-4 Q16, a memory leak vulnerability was found in the function ReadVIPSImage in coders/vips.c, which allows attackers to cause a denial of service (memory consumption in ResizeMagickMemory in MagickCore/memory.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14684/">CVE-2017-14684</cve>
	<bugzilla href="https://bugzilla.suse.com/1060177">SUSE bug 1060177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14729" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<bugzilla href="https://bugzilla.suse.com/1060621">SUSE bug 1060621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14731" ref_url="https://www.suse.com/security/cve/CVE-2017-14731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004310.html" source="SUSE-SU"/>
    <description>
    ofx_proc_file in ofx_preproc.cpp in LibOFX 0.9.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file, as demonstrated by an ofxdump call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14731/">CVE-2017-14731</cve>
	<bugzilla href="https://bugzilla.suse.com/1060437">SUSE bug 1060437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512360" comment="libofx-0.9.9-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512361" comment="libofx6-0.9.9-3.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519840" comment="libofx-0.9.9-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519841" comment="libofx6-0.9.9-3.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ReadRLEImage in coders/rle.c in GraphicsMagick 1.3.26 mishandles RLE headers that specify too few colors, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14739" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14739" ref_url="https://www.suse.com/security/cve/CVE-2017-14739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The AcquireResampleFilterThreadSet function in magick/resample-private.h in ImageMagick 7.0.7-4 mishandles failed memory allocation, which allows remote attackers to cause a denial of service (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14739/">CVE-2017-14739</cve>
	<bugzilla href="https://bugzilla.suse.com/1060382">SUSE bug 1060382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14745" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<bugzilla href="https://bugzilla.suse.com/1060599">SUSE bug 1060599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069666">SUSE bug 1069666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518318" comment="libdcerpc-atsvc0-4.2.4-28.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518325" comment="libdcerpc-binding0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518326" comment="libdcerpc-binding0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518327" comment="libdcerpc0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518328" comment="libdcerpc0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518329" comment="libndr-krb5pac0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518330" comment="libndr-krb5pac0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518331" comment="libndr-nbt0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518332" comment="libndr-nbt0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518333" comment="libndr-standard0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518334" comment="libndr-standard0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518335" comment="libndr0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518336" comment="libndr0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518337" comment="libnetapi0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518338" comment="libnetapi0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518339" comment="libsamba-credentials0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518340" comment="libsamba-credentials0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518341" comment="libsamba-errors0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518342" comment="libsamba-errors0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518343" comment="libsamba-hostconfig0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518344" comment="libsamba-hostconfig0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518345" comment="libsamba-passdb0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518346" comment="libsamba-passdb0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518347" comment="libsamba-util0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518348" comment="libsamba-util0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518349" comment="libsamdb0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518350" comment="libsamdb0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518351" comment="libsmbclient0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518352" comment="libsmbclient0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518353" comment="libsmbconf0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518354" comment="libsmbconf0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518355" comment="libsmbldap0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518356" comment="libsmbldap0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518357" comment="libtevent-util0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518358" comment="libtevent-util0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518359" comment="libwbclient0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518360" comment="libwbclient0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518361" comment="samba-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518362" comment="samba-client-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518363" comment="samba-client-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518364" comment="samba-doc-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518365" comment="samba-libs-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518366" comment="samba-libs-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518367" comment="samba-winbind-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518368" comment="samba-winbind-32bit-4.4.2-38.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519586" comment="libdcerpc-binding0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519587" comment="libdcerpc-binding0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519588" comment="libdcerpc0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519589" comment="libdcerpc0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519590" comment="libndr-krb5pac0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519591" comment="libndr-krb5pac0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519592" comment="libndr-nbt0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519593" comment="libndr-nbt0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519594" comment="libndr-standard0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519595" comment="libndr-standard0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519596" comment="libndr0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519597" comment="libndr0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519598" comment="libnetapi0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519599" comment="libnetapi0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519600" comment="libsamba-credentials0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519601" comment="libsamba-credentials0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519602" comment="libsamba-errors0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519603" comment="libsamba-errors0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519604" comment="libsamba-hostconfig0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519605" comment="libsamba-hostconfig0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519606" comment="libsamba-passdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519607" comment="libsamba-passdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519608" comment="libsamba-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519609" comment="libsamba-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519610" comment="libsamdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519611" comment="libsamdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519612" comment="libsmbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519613" comment="libsmbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519614" comment="libsmbconf0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519615" comment="libsmbconf0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519616" comment="libsmbldap0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519617" comment="libsmbldap0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519618" comment="libtevent-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519619" comment="libtevent-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519620" comment="libwbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519621" comment="libwbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519622" comment="samba-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519623" comment="samba-client-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519624" comment="samba-client-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519625" comment="samba-doc-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519626" comment="samba-libs-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519627" comment="samba-libs-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519628" comment="samba-winbind-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519629" comment="samba-winbind-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14857" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14857" ref_url="https://www.suse.com/security/cve/CVE-2017-14857" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is an invalid free in the Image class in image.cpp that leads to a Segmentation fault. A crafted input will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14857/">CVE-2017-14857</cve>
	<bugzilla href="https://bugzilla.suse.com/1061013">SUSE bug 1061013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14859" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859</cve>
	<bugzilla href="https://bugzilla.suse.com/1061000">SUSE bug 1061000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14860" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14860" ref_url="https://www.suse.com/security/cve/CVE-2017-14860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the Exiv2::Jp2Image::readMetadata function of jp2image.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14860/">CVE-2017-14860</cve>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14861" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14861" ref_url="https://www.suse.com/security/cve/CVE-2017-14861" source="SUSE CVE"/>
    <description>
    There is a stack consumption vulnerability in the Exiv2::Internal::stringFormat function of image.cpp in Exiv2 0.26. A Crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14861/">CVE-2017-14861</cve>
	<bugzilla href="https://bugzilla.suse.com/1060997">SUSE bug 1060997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14862" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    An Invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862</cve>
	<bugzilla href="https://bugzilla.suse.com/1060996">SUSE bug 1060996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14863" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14863" ref_url="https://www.suse.com/security/cve/CVE-2017-14863" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference was discovered in Exiv2::Image::printIFDStructure in image.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14863/">CVE-2017-14863</cve>
	<bugzilla href="https://bugzilla.suse.com/1061031">SUSE bug 1061031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14864" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864</cve>
	<bugzilla href="https://bugzilla.suse.com/1060995">SUSE bug 1060995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080734">SUSE bug 1080734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14927" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14927" ref_url="https://www.suse.com/security/cve/CVE-2017-14927" source="SUSE CVE"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in the SplashOutputDev::type3D0() function in SplashOutputDev.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14927/">CVE-2017-14927</cve>
	<bugzilla href="https://bugzilla.suse.com/1061094">SUSE bug 1061094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14928" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14928" ref_url="https://www.suse.com/security/cve/CVE-2017-14928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in AnnotRichMedia::Configuration::Configuration in Annot.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14928/">CVE-2017-14928</cve>
	<bugzilla href="https://bugzilla.suse.com/1061092">SUSE bug 1061092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14929" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14929" ref_url="https://www.suse.com/security/cve/CVE-2017-14929" source="SUSE CVE"/>
    <description>
    In Poppler 0.59.0, memory corruption occurs in a call to Object::dictLookup() in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opFill, Gfx::doPatternFill, Gfx::doTilingPatternFill and Gfx::drawForm calls (aka a Gfx.cc infinite loop), a different vulnerability than CVE-2017-14519.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14929/">CVE-2017-14929</cve>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061091">SUSE bug 1061091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14952" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a "redundant UVector entry clean up function call" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14974" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<bugzilla href="https://bugzilla.suse.com/1061241">SUSE bug 1061241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14975" ref_url="https://www.suse.com/security/cve/CVE-2017-14975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a NULL pointer dereference vulnerability because a data structure is not initialized, which allows an attacker to launch a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14975/">CVE-2017-14975</cve>
	<bugzilla href="https://bugzilla.suse.com/1061263">SUSE bug 1061263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14976" ref_url="https://www.suse.com/security/cve/CVE-2017-14976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14976/">CVE-2017-14976</cve>
	<bugzilla href="https://bugzilla.suse.com/1061264">SUSE bug 1061264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004189.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The FoFiTrueType::getCFFBlock function in FoFiTrueType.cc in Poppler 0.59.0 has a NULL pointer dereference vulnerability due to lack of validation of a table pointer, which allows an attacker to launch a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518295" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14988" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005771.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in IlmImf/ImfCRgbaFile.cpp. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988</cve>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522030" comment="libIlmImf-Imf_2_1-21-2.1.0-6.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522031" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522032" comment="openexr-2.1.0-6.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14989" ref_url="https://www.suse.com/security/cve/CVE-2017-14989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    A use-after-free in RenderFreetype in MagickCore/annotate.c in ImageMagick 7.0.7-4 Q16 allows attackers to crash the application via a crafted font file, because the FT_Done_Glyph function (from FreeType 2) is called at an incorrect place in the ImageMagick code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14989/">CVE-2017-14989</cve>
	<bugzilla href="https://bugzilla.suse.com/1061254">SUSE bug 1061254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14994" ref_url="https://www.suse.com/security/cve/CVE-2017-14994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
    <description>
    ReadDCMImage in coders/dcm.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted DICOM image, related to the ability of DCM_ReadNonNativeImages to yield an image list with zero frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14994/">CVE-2017-14994</cve>
	<bugzilla href="https://bugzilla.suse.com/1061587">SUSE bug 1061587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00079.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997</cve>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520279" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520280" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520281" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520282" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520283" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15015" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15015" ref_url="https://www.suse.com/security/cve/CVE-2017-15015" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in PDFDelegateMessage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-15015/">CVE-2017-15015</cve>
	<bugzilla href="https://bugzilla.suse.com/1082289">SUSE bug 1082289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadEnhMetaFile in coders/emf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15017" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadOneMNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15023" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15023" ref_url="https://www.suse.com/security/cve/CVE-2017-15023" source="SUSE CVE"/>
    <description>
    read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15023/">CVE-2017-15023</cve>
	<bugzilla href="https://bugzilla.suse.com/1061623">SUSE bug 1061623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15032" ref_url="https://www.suse.com/security/cve/CVE-2017-15032" source="SUSE CVE"/>
    <description>
    ImageMagick version 7.0.7-2 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15032/">CVE-2017-15032</cve>
	<bugzilla href="https://bugzilla.suse.com/1061868">SUSE bug 1061868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick version 7.0.7-2 contains a memory leak in ReadYUVImage in coders/yuv.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519572" comment="qemu-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519573" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519575" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519578" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00020.html" source="SUSE-SU"/>
    <description>
    plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088</cve>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518286" comment="krb5-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518287" comment="krb5-32bit-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518288" comment="krb5-client-1.12.5-40.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15095" ref_url="https://www.suse.com/security/cve/CVE-2017-15095" source="SUSE CVE"/>
		<reference ref_id="TID7023098" ref_url="https://www.suse.com/support/kb/doc/?id=7023098" source="SUSE-SU"/>
		<reference ref_id="TID7023117" ref_url="https://www.suse.com/support/kb/doc/?id=7023117" source="SUSE-SU"/>
    <description>
    A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-15"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15095/">CVE-2017-15095</cve>
	<bugzilla href="https://bugzilla.suse.com/1192165">SUSE bug 1192165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193944">SUSE bug 1193944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3425-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518409" comment="libecpg6-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518410" comment="libpq5-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518411" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518412" comment="postgresql96-9.6.6-3.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518409" comment="libecpg6-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518410" comment="libpq5-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518411" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519164" comment="postgresql94-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518412" comment="postgresql96-9.6.6-3.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3425-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099</cve>
	<bugzilla href="https://bugzilla.suse.com/1067841">SUSE bug 1067841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518409" comment="libecpg6-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518410" comment="libpq5-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518411" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518412" comment="postgresql96-9.6.6-3.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003411.html" source="SUSE-SU"/>
    <description>
    A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101</cve>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334092" comment="liblouis is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006208.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00027.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521547" comment="dnsmasq-2.78-18.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003708.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00028.html" source="SUSE-SU"/>
    <description>
    spice-vdagent up to and including 0.17.0 does not properly escape save directory before passing to shell, allowing local attacker with access to the session the agent runs in to inject arbitrary commands to be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108</cve>
	<bugzilla href="https://bugzilla.suse.com/1070724">SUSE bug 1070724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170918" comment="spice-vdagent-0.16.0-8.5.15 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518839" comment="spice-vdagent-0.16.0-8.5.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15118" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118" source="SUSE CVE"/>
    <description>
    A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118</cve>
	<bugzilla href="https://bugzilla.suse.com/1070147">SUSE bug 1070147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<bugzilla href="https://bugzilla.suse.com/1070144">SUSE bug 1070144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15121" ref_url="https://www.suse.com/security/cve/CVE-2017-15121" source="SUSE CVE"/>
    <description>
    A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15121/">CVE-2017-15121</cve>
	<bugzilla href="https://bugzilla.suse.com/1071726">SUSE bug 1071726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124</cve>
	<bugzilla href="https://bugzilla.suse.com/1073489">SUSE bug 1073489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15126" ref_url="https://www.suse.com/security/cve/CVE-2017-15126" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-15126/">CVE-2017-15126</cve>
	<bugzilla href="https://bugzilla.suse.com/1073108">SUSE bug 1073108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15127" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15127" ref_url="https://www.suse.com/security/cve/CVE-2017-15127" source="SUSE CVE"/>
    <description>
    A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13. A superfluous implicit page unlock for VM_SHARED hugetlbfs mapping could trigger a local denial of service (BUG).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15127/">CVE-2017-15127</cve>
	<bugzilla href="https://bugzilla.suse.com/1073113">SUSE bug 1073113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15128" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15128" ref_url="https://www.suse.com/security/cve/CVE-2017-15128" source="SUSE CVE"/>
    <description>
    A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15128/">CVE-2017-15128</cve>
	<bugzilla href="https://bugzilla.suse.com/1073112">SUSE bug 1073112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15129" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<bugzilla href="https://bugzilla.suse.com/1074839">SUSE bug 1074839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15131" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15131" ref_url="https://www.suse.com/security/cve/CVE-2017-15131" source="SUSE CVE"/>
    <description>
    It was found that system umask policy is not being honored when creating XDG user directories, since Xsession sources xdg-user-dirs.sh before setting umask policy. This only affects xdg-user-dirs before 0.15.5 as shipped with Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-15131/">CVE-2017-15131</cve>
	<bugzilla href="https://bugzilla.suse.com/1075378">SUSE bug 1075378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334354" comment="gnome-session is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338983" comment="xdg-user-dirs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15191" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00045.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518239" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518240" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518241" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518242" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518243" comment="wireshark-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518244" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15192" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00045.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518239" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518240" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518241" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518242" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518243" comment="wireshark-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518244" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00045.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518239" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518240" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518241" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518242" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518243" comment="wireshark-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518244" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15217" ref_url="https://www.suse.com/security/cve/CVE-2017-15217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15217/">CVE-2017-15217</cve>
	<bugzilla href="https://bugzilla.suse.com/1062750">SUSE bug 1062750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0393-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00023.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo 1.5.2 has a NULL Pointer Dereference in jdpostct.c and jquant1.c via a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170911" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170912" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170913" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170914" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170915" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170916" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170917" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518832" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518833" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518834" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518835" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518836" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518837" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518838" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15238" ref_url="https://www.suse.com/security/cve/CVE-2017-15238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
    <description>
    ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26 has a use-after-free issue when the height or width is zero, related to ReadJNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15238/">CVE-2017-15238</cve>
	<bugzilla href="https://bugzilla.suse.com/1067198">SUSE bug 1067198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00085.html" source="SUSE-SU"/>
    <description>
    Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<bugzilla href="https://bugzilla.suse.com/1062942">SUSE bug 1062942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519572" comment="qemu-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519573" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519575" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519578" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15274" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2787-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
    <description>
    security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274</cve>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062471">SUSE bug 1062471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069666">SUSE bug 1069666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518318" comment="libdcerpc-atsvc0-4.2.4-28.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518325" comment="libdcerpc-binding0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518326" comment="libdcerpc-binding0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518327" comment="libdcerpc0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518328" comment="libdcerpc0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518329" comment="libndr-krb5pac0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518330" comment="libndr-krb5pac0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518331" comment="libndr-nbt0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518332" comment="libndr-nbt0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518333" comment="libndr-standard0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518334" comment="libndr-standard0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518335" comment="libndr0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518336" comment="libndr0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518337" comment="libnetapi0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518338" comment="libnetapi0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518339" comment="libsamba-credentials0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518340" comment="libsamba-credentials0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518341" comment="libsamba-errors0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518342" comment="libsamba-errors0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518343" comment="libsamba-hostconfig0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518344" comment="libsamba-hostconfig0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518345" comment="libsamba-passdb0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518346" comment="libsamba-passdb0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518347" comment="libsamba-util0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518348" comment="libsamba-util0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518349" comment="libsamdb0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518350" comment="libsamdb0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518351" comment="libsmbclient0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518352" comment="libsmbclient0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518353" comment="libsmbconf0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518354" comment="libsmbconf0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518355" comment="libsmbldap0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518356" comment="libsmbldap0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518357" comment="libtevent-util0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518358" comment="libtevent-util0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518359" comment="libwbclient0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518360" comment="libwbclient0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518361" comment="samba-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518362" comment="samba-client-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518363" comment="samba-client-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518364" comment="samba-doc-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518365" comment="samba-libs-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518366" comment="samba-libs-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518367" comment="samba-winbind-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518368" comment="samba-winbind-32bit-4.4.2-38.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519586" comment="libdcerpc-binding0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519587" comment="libdcerpc-binding0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519588" comment="libdcerpc0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519589" comment="libdcerpc0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519590" comment="libndr-krb5pac0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519591" comment="libndr-krb5pac0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519592" comment="libndr-nbt0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519593" comment="libndr-nbt0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519594" comment="libndr-standard0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519595" comment="libndr-standard0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519596" comment="libndr0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519597" comment="libndr0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519598" comment="libnetapi0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519599" comment="libnetapi0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519600" comment="libsamba-credentials0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519601" comment="libsamba-credentials0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519602" comment="libsamba-errors0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519603" comment="libsamba-errors0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519604" comment="libsamba-hostconfig0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519605" comment="libsamba-hostconfig0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519606" comment="libsamba-passdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519607" comment="libsamba-passdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519608" comment="libsamba-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519609" comment="libsamba-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519610" comment="libsamdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519611" comment="libsamdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519612" comment="libsmbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519613" comment="libsmbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519614" comment="libsmbconf0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519615" comment="libsmbconf0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519616" comment="libsmbldap0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519617" comment="libsmbldap0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519618" comment="libtevent-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519619" comment="libtevent-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519620" comment="libwbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519621" comment="libwbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519622" comment="samba-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519623" comment="samba-client-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519624" comment="samba-client-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519625" comment="samba-doc-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519626" comment="samba-libs-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519627" comment="samba-libs-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519628" comment="samba-winbind-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519629" comment="samba-winbind-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15281" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    ReadPSDImage in coders/psd.c in ImageMagick 7.0.7-6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to "Conditional jump or move depends on uninitialised value(s)."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15286" ref_url="https://www.suse.com/security/cve/CVE-2017-15286" source="SUSE CVE"/>
    <description>
    SQLite 3.20.1 has a NULL pointer dereference in tableColumnList in shell.c because it fails to consider certain cases where `sqlite3_step(pStmt)==SQLITE_ROW` is false and a data structure is never initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15286/">CVE-2017-15286</cve>
	<bugzilla href="https://bugzilla.suse.com/1063145">SUSE bug 1063145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00004.html" source="SUSE-SU"/>
    <description>
    The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518378" comment="xen-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518379" comment="xen-libs-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518380" comment="xen-libs-32bit-4.7.4_02-43.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519572" comment="qemu-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519573" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519575" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519578" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519583" comment="xen-4.9.1_02-3.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519584" comment="xen-libs-4.9.1_02-3.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519585" comment="xen-libs-32bit-4.9.1_02-3.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
    <description>
    sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365</cve>
	<bugzilla href="https://bugzilla.suse.com/1072167">SUSE bug 1072167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15400" ref_url="https://www.suse.com/security/cve/CVE-2017-15400" source="SUSE CVE"/>
    <description>
    Insufficient restriction of IPP filters in CUPS in Google Chrome OS prior to 62.0.3202.74 allowed a remote attacker to execute a command with the same privileges as the cups daemon via a crafted PPD file, aka a printer zeroconfig CRLF issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15400/">CVE-2017-15400</cve>
	<bugzilla href="https://bugzilla.suse.com/1102220">SUSE bug 1102220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334301" comment="cups is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<bugzilla href="https://bugzilla.suse.com/1071691">SUSE bug 1071691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518877" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518878" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518879" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518880" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15422" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<bugzilla href="https://bugzilla.suse.com/1071691">SUSE bug 1071691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15537" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15537" ref_url="https://www.suse.com/security/cve/CVE-2017-15537" source="SUSE CVE"/>
    <description>
    The x86/fpu (Floating Point Unit) subsystem in the Linux kernel before 4.13.5, when a processor supports the xsave feature but not the xsaves feature, does not correctly handle attempts to set reserved bits in the xstate header via the ptrace() or rt_sigreturn() system call, allowing local users to read the FPU registers of other processes on the system, related to arch/x86/kernel/fpu/regset.c and arch/x86/kernel/fpu/signal.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15537/">CVE-2017-15537</cve>
	<bugzilla href="https://bugzilla.suse.com/1063984">SUSE bug 1063984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in the GfxImageColorMap::getGrayLine() function in GfxState.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565</cve>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15591" ref_url="https://www.suse.com/security/cve/CVE-2017-15591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.5.x through 4.9.x allowing attackers (who control a stub domain kernel or tool stack) to cause a denial of service (host OS crash) because of a missing comparison (of range start to range end) within the DMOP map/unmap implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15591/">CVE-2017-15591</cve>
	<bugzilla href="https://bugzilla.suse.com/1061077">SUSE bug 1061077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (memory leak) because reference counts are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a grant of a dying domain, the assumption turns out wrong. A malicious guest administrator can cause hypervisor memory corruption, most likely resulting in host crash and a Denial of Service. Privilege escalation and information leaks cannot be ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518378" comment="xen-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518379" comment="xen-libs-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518380" comment="xen-libs-32bit-4.7.4_02-43.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519583" comment="xen-4.9.1_02-3.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519584" comment="xen-libs-4.9.1_02-3.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519585" comment="xen-libs-32bit-4.9.1_02-3.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15631" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15631" ref_url="https://www.suse.com/security/cve/CVE-2017-15631" source="SUSE CVE"/>
    <description>
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-workmode variable in the pptp_client.lua file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-15631/">CVE-2017-15631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512640" comment="yubikey-manager-0.6.0-1.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15638" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2940-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00014.html" source="SUSE-SU"/>
    <description>
    The SuSEfirewall2 package before 3.6.312-2.13.1 in SUSE Linux Enterprise (SLE) Desktop 12 SP2, Server 12 SP2, and Server for Raspberry Pi 12 SP2; before 3.6.312.333-3.10.1 in SLE Desktop 12 SP3 and Server 12 SP3; before 3.6_SVNr208-2.18.3.1 in SLE Server 11 SP4; before 3.6.312-5.9.1 in openSUSE Leap 42.2; and before 3.6.312.333-7.1 in openSUSE Leap 42.3 might allow remote attackers to bypass intended access restrictions on the portmap service by leveraging a missing source net restriction for _rpc_ services.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512022" comment="SuSEfirewall2-3.6.312.333-3.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518256" comment="SuSEfirewall2-3.6.312-2.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519581" comment="SuSEfirewall2-3.6.312.333-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00085.html" source="SUSE-SU"/>
    <description>
    net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064392">SUSE bug 1064392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15652" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15652" ref_url="https://www.suse.com/security/cve/CVE-2017-15652" source="SUSE CVE"/>
    <description>
    Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of imagemagick also use libga, so it was affected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15652/">CVE-2017-15652</cve>
	<bugzilla href="https://bugzilla.suse.com/1136756">SUSE bug 1136756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519055" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519056" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519057" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519058" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519060" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519061" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519062" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519055" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519056" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519057" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519058" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519060" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519061" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519062" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15705" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2011-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192011-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed tags in emails that cause markup to be handled incorrectly leading to scan timeouts. In Apache SpamAssassin, using HTML::Parser, we setup an object and hook into the begin and end tag event handlers In both cases, the "open" event is immediately followed by a "close" event - even if the tag *does not* close in the HTML being parsed. Because of this, we are missing the "text" event to deal with the object normally. This can cause carefully crafted emails that might take more scan time than expected leading to a Denial of Service. The issue is possibly a bug or design decision in HTML::Parser that specifically impacts the way Apache SpamAssassin uses the module with poorly formed html. The exploit has been seen in the wild but not believed to have been purposefully part of a Denial of Service attempt. We are concerned that there may be attempts to abuse the vulnerability in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705</cve>
	<bugzilla href="https://bugzilla.suse.com/1108745">SUSE bug 1108745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522005" comment="perl-Mail-SpamAssassin-3.4.2-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522006" comment="spamassassin-3.4.2-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519055" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519056" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519057" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519058" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519060" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519061" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519062" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0276-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00091.html" source="SUSE-SU"/>
    <description>
    The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-01"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868</cve>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071471">SUSE bug 1071471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15874" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338984" comment="busybox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00032.html" source="SUSE-SU"/>
    <description>
    The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<bugzilla href="https://bugzilla.suse.com/1064285">SUSE bug 1064285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074115">SUSE bug 1074115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079488">SUSE bug 1079488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090163">SUSE bug 1090163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099316">SUSE bug 1099316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518396" comment="openssh-7.2p2-74.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518397" comment="openssh-askpass-gnome-7.2p2-74.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518398" comment="openssh-helpers-7.2p2-74.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0320-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00118.html" source="SUSE-SU"/>
    <description>
    In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908</cve>
	<bugzilla href="https://bugzilla.suse.com/1065276">SUSE bug 1065276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518810" comment="libsystemd0-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518811" comment="libsystemd0-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518812" comment="libudev1-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518813" comment="libudev1-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518814" comment="systemd-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518815" comment="systemd-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518816" comment="systemd-bash-completion-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518817" comment="systemd-sysvinit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518818" comment="udev-228-150.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26, a Null Pointer Dereference occurs while transferring JPEG scanlines, related to a PixelPacket pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15939" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<bugzilla href="https://bugzilla.suse.com/1061623">SUSE bug 1061623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065615">SUSE bug 1065615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15994" ref_url="https://www.suse.com/security/cve/CVE-2017-15994" source="SUSE CVE"/>
    <description>
    rsync 3.1.3-development before 2017-10-24 mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. NOTE: the rsync development branch has significant use beyond the rsync developers, e.g., the code has been copied for use in various GitHub projects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15994/">CVE-2017-15994</cve>
	<bugzilla href="https://bugzilla.suse.com/1065646">SUSE bug 1065646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338986" comment="rsync is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16012" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16012" ref_url="https://www.suse.com/security/cve/CVE-2017-16012" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2015-9251.  Reason: This candidate is a duplicate of CVE-2015-9251.  Notes: All CVE users should reference CVE-2015-9251 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-15"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16012/">CVE-2017-16012</cve>
	<bugzilla href="https://bugzilla.suse.com/1111660">SUSE bug 1111660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16232" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<bugzilla href="https://bugzilla.suse.com/1069213">SUSE bug 1069213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519147" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519148" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 is vulnerable to a heap-based buffer overflow vulnerability found in the "Display visual image directory" feature of the DescribeImage() function of the magick/describe.c file. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16525" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16527" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    sound/usb/mixer.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16528" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    sound/core/seq_device.c in the Linux kernel before 4.13.4 allows local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<bugzilla href="https://bugzilla.suse.com/1066629">SUSE bug 1066629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16529" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16531" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    drivers/usb/core/config.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16532" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16532" ref_url="https://www.suse.com/security/cve/CVE-2017-16532" source="SUSE CVE"/>
    <description>
    The get_endpoints function in drivers/usb/misc/usbtest.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16532/">CVE-2017-16532</cve>
	<bugzilla href="https://bugzilla.suse.com/1066673">SUSE bug 1066673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521793" comment="kernel-default-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521794" comment="kernel-default-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521795" comment="kernel-default-extra-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521796" comment="kernel-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521797" comment="kernel-macros-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521798" comment="kernel-source-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521799" comment="kernel-syms-4.12.14-95.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16534" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16535" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel before 4.13.10 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16536" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16537" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in GraphicsMagick 1.3.26 does not properly validate colormapped images, which allows remote attackers to cause a denial of service (ImportIndexQuantumType invalid write and application crash) or possibly have unspecified other impact via a malformed WPG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519176" comment="rsync-3.1.0-13.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611" source="SUSE CVE"/>
    <description>
    In libXfont before 1.5.4 and libXfont2 before 2.0.3, a local attacker can open (but not read) files on the system as root, triggering tape rewinds, watchdogs, or similar mechanisms that can be triggered by opening files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611</cve>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512240" comment="libXfont2-2-2.0.3-1.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0504-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00087.html" source="SUSE-SU"/>
    <description>
    libXcursor before 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland through 1.14.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512236" comment="libXcursor1-1.1.14-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512237" comment="libXcursor1-32bit-1.1.14-4.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518387" comment="libXcursor1-1.1.14-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518388" comment="libXcursor1-32bit-1.1.14-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16645" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<bugzilla href="https://bugzilla.suse.com/1067132">SUSE bug 1067132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<bugzilla href="https://bugzilla.suse.com/1067105">SUSE bug 1067105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16647" ref_url="https://www.suse.com/security/cve/CVE-2017-16647" source="SUSE CVE"/>
    <description>
    drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16647/">CVE-2017-16647</cve>
	<bugzilla href="https://bugzilla.suse.com/1067102">SUSE bug 1067102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16649" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067115">SUSE bug 1067115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16650" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16650" ref_url="https://www.suse.com/security/cve/CVE-2017-16650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
    <description>
    The qmi_wwan_bind function in drivers/net/usb/qmi_wwan.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16650/">CVE-2017-16650</cve>
	<bugzilla href="https://bugzilla.suse.com/1067086">SUSE bug 1067086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    coders/wpg.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the AcquireCacheNexus function in magick/pixel_cache.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669</cve>
	<bugzilla href="https://bugzilla.suse.com/1067409">SUSE bug 1067409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16808" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16808" ref_url="https://www.suse.com/security/cve/CVE-2017-16808" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16808/">CVE-2017-16808</cve>
	<bugzilla href="https://bugzilla.suse.com/1068716">SUSE bug 1068716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522066" comment="tcpdump-4.9.2-14.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00114.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00071.html" source="SUSE-SU"/>
    <description>
    RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818</cve>
	<bugzilla href="https://bugzilla.suse.com/1063014">SUSE bug 1063014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069253">SUSE bug 1069253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512053" comment="ceph-common-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512054" comment="libcephfs2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512055" comment="librados2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512056" comment="libradosstriper1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512057" comment="librbd1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512058" comment="librgw2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512059" comment="python-cephfs-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512060" comment="python-rados-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512061" comment="python-rbd-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512062" comment="python-rgw-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521008" comment="ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521009" comment="libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521010" comment="librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521011" comment="libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521012" comment="librbd1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521013" comment="librgw2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521014" comment="python-cephfs-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521015" comment="python-rados-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521016" comment="python-rbd-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521017" comment="python-rgw-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16829" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003618.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009169961" comment="procmail-3.22-269.3.5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518764" comment="procmail-3.22-269.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16845" ref_url="https://www.suse.com/security/cve/CVE-2017-16845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16845/">CVE-2017-16845</cve>
	<bugzilla href="https://bugzilla.suse.com/1068613">SUSE bug 1068613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879</cve>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334357" comment="ncurses is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16899" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00081.html" source="SUSE-SU"/>
    <description>
    An array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170244" comment="transfig-3.2.5e-2.3.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518797" comment="transfig-3.2.5e-2.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16909" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16909" ref_url="https://www.suse.com/security/cve/CVE-2017-16909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003548.html" source="SUSE-SU"/>
    <description>
    An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16909/">CVE-2017-16909</cve>
	<bugzilla href="https://bugzilla.suse.com/1072385">SUSE bug 1072385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518408" comment="libraw9-0.15.4-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16910" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16910" ref_url="https://www.suse.com/security/cve/CVE-2017-16910" source="SUSE CVE"/>
    <description>
    An error within the "LibRaw::xtrans_interpolate()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16910/">CVE-2017-16910</cve>
	<bugzilla href="https://bugzilla.suse.com/1072384">SUSE bug 1072384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334040" comment="dcraw is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The "stub_send_ret_submit()" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16927" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16927" ref_url="https://www.suse.com/security/cve/CVE-2017-16927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005721.html" source="SUSE-SU"/>
    <description>
    The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16927/">CVE-2017-16927</cve>
	<bugzilla href="https://bugzilla.suse.com/1069591">SUSE bug 1069591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/442182">SUSE bug 442182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521959" comment="xrdp-0.9.0~git.1456906198.f422461-21.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932</cve>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334009" comment="libxml2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0276-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069708">SUSE bug 1069708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120260">SUSE bug 1120260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518389" comment="kernel-default-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518390" comment="kernel-default-devel-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518391" comment="kernel-default-extra-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518392" comment="kernel-devel-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518393" comment="kernel-macros-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518394" comment="kernel-source-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518395" comment="kernel-syms-4.4.90-92.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519630" comment="kernel-default-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519631" comment="kernel-default-devel-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519632" comment="kernel-default-extra-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519633" comment="kernel-devel-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519634" comment="kernel-macros-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519635" comment="kernel-source-4.4.92-6.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519636" comment="kernel-syms-4.4.92-6.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16942" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    In libsndfile 1.0.25 (fixed in 1.0.26), a divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518830" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518831" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<bugzilla href="https://bugzilla.suse.com/1069996">SUSE bug 1069996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16995" ref_url="https://www.suse.com/security/cve/CVE-2017-16995" source="SUSE CVE"/>
    <description>
    The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16995/">CVE-2017-16995</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16996" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16996" ref_url="https://www.suse.com/security/cve/CVE-2017-16996" source="SUSE CVE"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16996/">CVE-2017-16996</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<bugzilla href="https://bugzilla.suse.com/1073231">SUSE bug 1073231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519055" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519056" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519057" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519058" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519060" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519061" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519062" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17046" ref_url="https://www.suse.com/security/cve/CVE-2017-17046" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x on the ARM platform allowing guest OS users to obtain sensitive information from DRAM after a reboot, because disjoint blocks, and physical addresses that do not start at zero, are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17046/">CVE-2017-17046</cve>
	<bugzilla href="https://bugzilla.suse.com/1061090">SUSE bug 1061090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17052" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17052" ref_url="https://www.suse.com/security/cve/CVE-2017-17052" source="SUSE CVE"/>
    <description>
    The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the -&gt;exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17052/">CVE-2017-17052</cve>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070266">SUSE bug 1070266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17083" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00011.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518434" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518435" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518436" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518437" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518438" comment="wireshark-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518439" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17084" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00011.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518434" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518435" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518436" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518437" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518438" comment="wireshark-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518439" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17085" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00011.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518434" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518435" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518436" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518437" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518438" comment="wireshark-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518439" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17122" ref_url="https://www.suse.com/security/cve/CVE-2017-17122" source="SUSE CVE"/>
    <description>
    The dump_relocs_in_section function in objdump.c in GNU Binutils 2.29.1 does not check for reloc count integer overflows, which allows remote attackers to cause a denial of service (excessive memory allocation, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17122/">CVE-2017-17122</cve>
	<bugzilla href="https://bugzilla.suse.com/1071440">SUSE bug 1071440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17125" ref_url="https://www.suse.com/security/cve/CVE-2017-17125" source="SUSE CVE"/>
    <description>
    nm.c and objdump.c in GNU Binutils 2.29.1 mishandle certain global symbols, which allows remote attackers to cause a denial of service (_bfd_elf_get_symbol_version_string buffer over-read and application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17125/">CVE-2017-17125</cve>
	<bugzilla href="https://bugzilla.suse.com/1071022">SUSE bug 1071022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17126" ref_url="https://www.suse.com/security/cve/CVE-2017-17126" source="SUSE CVE"/>
    <description>
    The load_debug_section function in readelf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via an ELF file that lacks section headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17126/">CVE-2017-17126</cve>
	<bugzilla href="https://bugzilla.suse.com/1071016">SUSE bug 1071016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2017171479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-171479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-171479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-171479" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-171479" ref_url="https://www.suse.com/security/cve/CVE-2017-171479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00091.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-171479/">CVE-2017-171479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17381" ref_url="https://www.suse.com/security/cve/CVE-2017-17381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    The Virtio Vring implementation in QEMU allows local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17381/">CVE-2017-17381</cve>
	<bugzilla href="https://bugzilla.suse.com/1071228">SUSE bug 1071228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405</cve>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17426" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426" source="SUSE CVE"/>
    <description>
    The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<bugzilla href="https://bugzilla.suse.com/1071479">SUSE bug 1071479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519176" comment="rsync-3.1.0-13.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519176" comment="rsync-3.1.0-13.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<bugzilla href="https://bugzilla.suse.com/1071693">SUSE bug 1071693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<bugzilla href="https://bugzilla.suse.com/1071694">SUSE bug 1071694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074033">SUSE bug 1074033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005286.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00015.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-14245. Reason: This candidate is a duplicate of CVE-2017-14245. Notes: All CVE users should reference CVE-2017-14245 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117906">SUSE bug 1117906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519838" comment="libsndfile1-1.0.25-36.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519839" comment="libsndfile1-32bit-1.0.25-36.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17457" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005286.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00015.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-14246. Reason: This candidate is a duplicate of CVE-2017-14246. Notes: All CVE users should reference CVE-2017-14246 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117906">SUSE bug 1117906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519838" comment="libsndfile1-1.0.25-36.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519839" comment="libsndfile1-32bit-1.0.25-36.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17479" ref_url="https://www.suse.com/security/cve/CVE-2017-17479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00091.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17479/">CVE-2017-17479</cve>
	<bugzilla href="https://bugzilla.suse.com/1072125">SUSE bug 1072125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520972" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17480" ref_url="https://www.suse.com/security/cve/CVE-2017-17480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00091.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17480/">CVE-2017-17480</cve>
	<bugzilla href="https://bugzilla.suse.com/1072124">SUSE bug 1072124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072125">SUSE bug 1072125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520972" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17484" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17498" ref_url="https://www.suse.com/security/cve/CVE-2017-17498" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00073.html" source="SUSE-SU"/>
    <description>
    WritePNMImage in coders/pnm.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (bit_stream.c MagickBitStreamMSBWrite heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17498/">CVE-2017-17498</cve>
	<bugzilla href="https://bugzilla.suse.com/1072103">SUSE bug 1072103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17500" ref_url="https://www.suse.com/security/cve/CVE-2017-17500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00106.html" source="SUSE-SU"/>
    <description>
    ReadRGBImage in coders/rgb.c in GraphicsMagick 1.3.26 has a magick/import.c ImportRGBQuantumType heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17500/">CVE-2017-17500</cve>
	<bugzilla href="https://bugzilla.suse.com/1077737">SUSE bug 1077737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17501" ref_url="https://www.suse.com/security/cve/CVE-2017-17501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
    <description>
    WriteOnePNGImage in coders/png.c in GraphicsMagick 1.3.26 has a heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17501/">CVE-2017-17501</cve>
	<bugzilla href="https://bugzilla.suse.com/1074023">SUSE bug 1074023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17502" ref_url="https://www.suse.com/security/cve/CVE-2017-17502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
    <description>
    ReadCMYKImage in coders/cmyk.c in GraphicsMagick 1.3.26 has a magick/import.c ImportCMYKQuantumType heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17502/">CVE-2017-17502</cve>
	<bugzilla href="https://bugzilla.suse.com/1073081">SUSE bug 1073081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077737">SUSE bug 1077737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17503" ref_url="https://www.suse.com/security/cve/CVE-2017-17503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
    <description>
    ReadGRAYImage in coders/gray.c in GraphicsMagick 1.3.26 has a magick/import.c ImportGrayQuantumType heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17503/">CVE-2017-17503</cve>
	<bugzilla href="https://bugzilla.suse.com/1072934">SUSE bug 1072934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073081">SUSE bug 1073081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077737">SUSE bug 1077737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.7-12 has a coders/png.c Magick_png_read_raw_profile heap-based buffer over-read via a crafted file, related to ReadOneMNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17669" ref_url="https://www.suse.com/security/cve/CVE-2017-17669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in Exiv2 0.26. A crafted PNG file will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17669/">CVE-2017-17669</cve>
	<bugzilla href="https://bugzilla.suse.com/1072928">SUSE bug 1072928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17681" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17681" ref_url="https://www.suse.com/security/cve/CVE-2017-17681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, an infinite loop vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted psd image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17681/">CVE-2017-17681</cve>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17682" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted wpg image file that triggers a ReadWPGImage call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17688" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17688" ref_url="https://www.suse.com/security/cve/CVE-2017-17688" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00096.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17688/">CVE-2017-17688</cve>
	<bugzilla href="https://bugzilla.suse.com/1093151">SUSE bug 1093151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093727">SUSE bug 1093727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115719">SUSE bug 1115719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334048" comment="evolution is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334049" comment="mutt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17689" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17689" ref_url="https://www.suse.com/security/cve/CVE-2017-17689" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00096.html" source="SUSE-SU"/>
    <description>
    The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17689/">CVE-2017-17689</cve>
	<bugzilla href="https://bugzilla.suse.com/1093152">SUSE bug 1093152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093727">SUSE bug 1093727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334048" comment="evolution is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334049" comment="mutt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet-&gt;hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<bugzilla href="https://bugzilla.suse.com/1073229">SUSE bug 1073229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17725" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17725" ref_url="https://www.suse.com/security/cve/CVE-2017-17725" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17725/">CVE-2017-17725</cve>
	<bugzilla href="https://bugzilla.suse.com/1080734">SUSE bug 1080734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184749">SUSE bug 1184749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17740" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" source="SUSE-SU"/>
    <description>
    contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740</cve>
	<bugzilla href="https://bugzilla.suse.com/1073313">SUSE bug 1073313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520427" comment="libldap-2_4-2-2.4.41-18.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520428" comment="libldap-2_4-2-32bit-2.4.41-18.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520429" comment="openldap2-client-2.4.41-18.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519726" comment="kernel-default-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519727" comment="kernel-default-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519728" comment="kernel-default-extra-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519729" comment="kernel-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519730" comment="kernel-macros-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519731" comment="kernel-source-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519732" comment="kernel-syms-4.4.138-94.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17785" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17785" ref_url="https://www.suse.com/security/cve/CVE-2017-17785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKBDGMCM5XJOHFKTACI2CEISBTSKVLD3/" source="SUSE-SU"/>
    <description>
    In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17785/">CVE-2017-17785</cve>
	<bugzilla href="https://bugzilla.suse.com/1073625">SUSE bug 1073625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522658" comment="gimp-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522659" comment="gimp-lang-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522660" comment="gimp-plugins-python-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522661" comment="libgimp-2_0-0-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522662" comment="libgimpui-2_0-0-2.8.18-9.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17786" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17786" ref_url="https://www.suse.com/security/cve/CVE-2017-17786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKBDGMCM5XJOHFKTACI2CEISBTSKVLD3/" source="SUSE-SU"/>
    <description>
    In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17786/">CVE-2017-17786</cve>
	<bugzilla href="https://bugzilla.suse.com/1073626">SUSE bug 1073626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522658" comment="gimp-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522659" comment="gimp-lang-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522660" comment="gimp-plugins-python-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522661" comment="libgimp-2_0-0-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522662" comment="libgimpui-2_0-0-2.8.18-9.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17788" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17788" ref_url="https://www.suse.com/security/cve/CVE-2017-17788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006584.html" source="SUSE-SU"/>
    <description>
    In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17788/">CVE-2017-17788</cve>
	<bugzilla href="https://bugzilla.suse.com/1073629">SUSE bug 1073629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522658" comment="gimp-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522659" comment="gimp-lang-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522660" comment="gimp-plugins-python-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522661" comment="libgimp-2_0-0-2.8.18-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522662" comment="libgimpui-2_0-0-2.8.18-9.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-01-08"/>
	<updated date="2022-01-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790</cve>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518756" comment="kernel-default-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518757" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518758" comment="kernel-default-extra-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518762" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519733" comment="kernel-default-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519734" comment="kernel-default-devel-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519735" comment="kernel-default-extra-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519736" comment="kernel-devel-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519737" comment="kernel-macros-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519738" comment="kernel-source-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519739" comment="kernel-syms-4.4.103-6.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518756" comment="kernel-default-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518757" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518758" comment="kernel-default-extra-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518762" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519733" comment="kernel-default-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519734" comment="kernel-default-devel-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519735" comment="kernel-default-extra-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519736" comment="kernel-devel-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519737" comment="kernel-macros-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519738" comment="kernel-source-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519739" comment="kernel-syms-4.4.103-6.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17833" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2779-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00063.html" source="SUSE-SU"/>
    <description>
    OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099519">SUSE bug 1099519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512581" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512582" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520128" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520129" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17852" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17852" ref_url="https://www.suse.com/security/cve/CVE-2017-17852" source="SUSE CVE"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17852/">CVE-2017-17852</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17853" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17853" ref_url="https://www.suse.com/security/cve/CVE-2017-17853" source="SUSE CVE"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17853/">CVE-2017-17853</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17854" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17854" ref_url="https://www.suse.com/security/cve/CVE-2017-17854" source="SUSE CVE"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17854/">CVE-2017-17854</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17855" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17855" ref_url="https://www.suse.com/security/cve/CVE-2017-17855" source="SUSE CVE"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17855/">CVE-2017-17855</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17856" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17856" ref_url="https://www.suse.com/security/cve/CVE-2017-17856" source="SUSE CVE"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17856/">CVE-2017-17856</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17857" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17857" ref_url="https://www.suse.com/security/cve/CVE-2017-17857" source="SUSE CVE"/>
    <description>
    The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17857/">CVE-2017-17857</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a heap-based buffer over-read in ReadOneMNGImage in coders/png.c, related to length calculation and caused by an off-by-one error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074175">SUSE bug 1074175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17880" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17880" ref_url="https://www.suse.com/security/cve/CVE-2017-17880" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a stack-based buffer over-read in WriteWEBPImage in coders/webp.c, related to a WEBP_DECODER_ABI_VERSION check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17880/">CVE-2017-17880</cve>
	<bugzilla href="https://bugzilla.suse.com/1074124">SUSE bug 1074124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074299">SUSE bug 1074299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted XPM image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17883" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17883" ref_url="https://www.suse.com/security/cve/CVE-2017-17883" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPGXImage in coders/pgx.c, which allows attackers to cause a denial of service via a crafted PGX image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17883/">CVE-2017-17883</cve>
	<bugzilla href="https://bugzilla.suse.com/1074121">SUSE bug 1074121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function WriteOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted PNG image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allows attackers to cause a denial of service via a crafted PICT image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17887" ref_url="https://www.suse.com/security/cve/CVE-2017-17887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function GetImagePixelCache in magick/cache.c, which allows attackers to cause a denial of service via a crafted MNG image file that is processed by ReadOneMNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17887/">CVE-2017-17887</cve>
	<bugzilla href="https://bugzilla.suse.com/1074117">SUSE bug 1074117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17914" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16, a vulnerability was found in the function ReadOnePNGImage in coders/png.c, which allows attackers to cause a denial of service (ReadOneMNGImage large loop) via a crafted mng image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-17 Q16 x86_64 has memory leaks in coders/msl.c, related to MSLPopImage and ProcessMSLScript, and associated with mishandling of MSLPushImage calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17935" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
    <description>
    The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518768" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518769" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518770" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518771" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518772" comment="wireshark-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518773" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17942" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00078.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520078" comment="libtiff5-4.0.9-44.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520079" comment="libtiff5-32bit-4.0.9-44.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17969" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00040.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969</cve>
	<bugzilla href="https://bugzilla.suse.com/1077725">SUSE bug 1077725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171463" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518950" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17973" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00025.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973</cve>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520887" comment="libtiff5-4.0.9-44.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520888" comment="libtiff5-32bit-4.0.9-44.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<bugzilla href="https://bugzilla.suse.com/1074426">SUSE bug 1074426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In Wireshark before 2.2.12, the MRDISC dissector misuses a NULL pointer and crashes. This was addressed in epan/dissectors/packet-mrdisc.c by validating an IPv4 address. This vulnerability is similar to CVE-2017-9343.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18008" ref_url="https://www.suse.com/security/cve/CVE-2017-18008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there is a Memory Leak in ReadPWPImage in coders/pwp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18008/">CVE-2017-18008</cve>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18013" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519749" comment="libtiff5-4.0.9-44.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519750" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080255">SUSE bug 1080255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, there are memory leaks in MontageImageCommand in MagickWand/montage.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085236">SUSE bug 1085236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-10 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18043" ref_url="https://www.suse.com/security/cve/CVE-2017-18043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18043/">CVE-2017-18043</cve>
	<bugzilla href="https://bugzilla.suse.com/1076775">SUSE bug 1076775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18075" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18075" ref_url="https://www.suse.com/security/cve/CVE-2017-18075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0576-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0577-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00021.html" source="SUSE-SU"/>
    <description>
    crypto/pcrypt.c in the Linux kernel before 4.14.13 mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (CONFIG_CRYPTO_USER_API_AEAD) and pcrypt (CONFIG_CRYPTO_PCRYPT) to cause a denial of service (kfree of an incorrect pointer) or possibly have unspecified other impact by executing a crafted sequence of system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18075/">CVE-2017-18075</cve>
	<bugzilla href="https://bugzilla.suse.com/1077402">SUSE bug 1077402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077404">SUSE bug 1077404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html" source="SUSE-SU"/>
    <description>
    systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078</cve>
	<bugzilla href="https://bugzilla.suse.com/1077925">SUSE bug 1077925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518963" comment="libsystemd0-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518964" comment="libsystemd0-32bit-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518965" comment="libudev1-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518966" comment="libudev1-32bit-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518967" comment="systemd-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518968" comment="systemd-32bit-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518969" comment="systemd-bash-completion-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518970" comment="systemd-sysvinit-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518971" comment="udev-228-150.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18174" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174</cve>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00026.html" source="SUSE-SU"/>
    <description>
    A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190</cve>
	<bugzilla href="https://bugzilla.suse.com/1081557">SUSE bug 1081557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518987" comment="cups-1.7.5-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518988" comment="cups-client-1.7.5-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518989" comment="cups-libs-1.7.5-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518990" comment="cups-libs-32bit-1.7.5-20.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18201" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00040.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<bugzilla href="https://bugzilla.suse.com/1082877">SUSE bug 1082877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173007" comment="libcdio14-0.90-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173008" comment="libcdio14-32bit-0.90-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173009" comment="libiso9660-8-0.90-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519014" comment="libcdio14-0.90-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519015" comment="libcdio14-32bit-0.90-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519016" comment="libiso9660-8-0.90-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18202" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18202" ref_url="https://www.suse.com/security/cve/CVE-2017-18202" source="SUSE CVE"/>
    <description>
    The __oom_reap_task_mm function in mm/oom_kill.c in the Linux kernel before 4.14.4 mishandles gather operations, which allows attackers to cause a denial of service (TLB entry leak or use-after-free) or possibly have unspecified other impact by triggering a copy_to_user call within a certain time window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18202/">CVE-2017-18202</cve>
	<bugzilla href="https://bugzilla.suse.com/1083088">SUSE bug 1083088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18204" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
    <description>
    The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18205" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no argument if HOME is not set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205</cve>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18206" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206</cve>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18207" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications "need to be prepared to handle a wide variety of exceptions."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512601" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512602" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519801" comment="libpython2_7-1_0-2.7.13-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519802" comment="libpython2_7-1_0-32bit-2.7.13-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520634" comment="libpython3_4m1_0-3.4.6-25.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519803" comment="python-2.7.13-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519804" comment="python-base-2.7.13-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519805" comment="python-curses-2.7.13-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519806" comment="python-devel-2.7.13-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519807" comment="python-tk-2.7.13-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519808" comment="python-xml-2.7.13-28.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520635" comment="python3-3.4.6-25.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520636" comment="python3-base-3.4.6-25.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520637" comment="python3-curses-3.4.6-25.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18209" ref_url="https://www.suse.com/security/cve/CVE-2017-18209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    In the GetOpenCLCachedFilesDirectory function in magick/opencl.c in ImageMagick 7.0.7, a NULL pointer dereference vulnerability occurs because a memory allocation result is not checked, related to GetOpenCLCacheDirectory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18209/">CVE-2017-18209</cve>
	<bugzilla href="https://bugzilla.suse.com/1083628">SUSE bug 1083628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18210" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18210" ref_url="https://www.suse.com/security/cve/CVE-2017-18210" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7, a NULL pointer dereference vulnerability was found in the function BenchmarkOpenCLDevices in MagickCore/opencl.c because a memory allocation result is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18210/">CVE-2017-18210</cve>
	<bugzilla href="https://bugzilla.suse.com/1083632">SUSE bug 1083632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18211" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18211" ref_url="https://www.suse.com/security/cve/CVE-2017-18211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7, a NULL pointer dereference vulnerability was found in the function saveBinaryCLProgram in magick/opencl.c because a program-lookup result is not checked, related to CacheOpenCLKernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18211/">CVE-2017-18211</cve>
	<bugzilla href="https://bugzilla.suse.com/1083634">SUSE bug 1083634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted file that triggers an attempt at a large png_pixels array allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219</cve>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18220" ref_url="https://www.suse.com/security/cve/CVE-2017-18220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
    <description>
    The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18220/">CVE-2017-18220</cve>
	<bugzilla href="https://bugzilla.suse.com/1084062">SUSE bug 1084062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18224" ref_url="https://www.suse.com/security/cve/CVE-2017-18224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18224/">CVE-2017-18224</cve>
	<bugzilla href="https://bugzilla.suse.com/1084831">SUSE bug 1084831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521793" comment="kernel-default-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521794" comment="kernel-default-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521795" comment="kernel-default-extra-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521796" comment="kernel-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521797" comment="kernel-macros-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521798" comment="kernel-source-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521799" comment="kernel-syms-4.12.14-95.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18229" ref_url="https://www.suse.com/security/cve/CVE-2017-18229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allows attackers to cause a denial of service via a crafted file, because file size is not properly used to restrict scanline, strip, and tile allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18229/">CVE-2017-18229</cve>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085236">SUSE bug 1085236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18230" ref_url="https://www.suse.com/security/cve/CVE-2017-18230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. A NULL pointer dereference vulnerability was found in the function ReadCINEONImage in coders/cineon.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18230/">CVE-2017-18230</cve>
	<bugzilla href="https://bugzilla.suse.com/1085233">SUSE bug 1085233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18231" ref_url="https://www.suse.com/security/cve/CVE-2017-18231" source="SUSE CVE"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. A NULL pointer dereference vulnerability was found in the function ReadEnhMetaFile in coders/emf.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18231/">CVE-2017-18231</cve>
	<bugzilla href="https://bugzilla.suse.com/1085232">SUSE bug 1085232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18233" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18233" ref_url="https://www.suse.com/security/cve/CVE-2017-18233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00041.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18233/">CVE-2017-18233</cve>
	<bugzilla href="https://bugzilla.suse.com/1085584">SUSE bug 1085584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512308" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520272" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18234" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.3. It allows remote attackers to cause a denial of service (invalid memcpy with resultant use-after-free) or possibly have unspecified other impact via a .pdf file containing JPEG data, related to XMPFiles/source/FormatSupport/ReconcileTIFF.cpp, XMPFiles/source/FormatSupport/TIFF_MemoryReader.cpp, and XMPFiles/source/FormatSupport/TIFF_Support.hpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234</cve>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103718">SUSE bug 1103718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512308" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520272" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18236" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18236" ref_url="https://www.suse.com/security/cve/CVE-2017-18236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00041.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. The ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via a crafted .asf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18236/">CVE-2017-18236</cve>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085589">SUSE bug 1085589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512308" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520272" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18238" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18238" ref_url="https://www.suse.com/security/cve/CVE-2017-18238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00041.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. The TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .qt file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18238/">CVE-2017-18238</cve>
	<bugzilla href="https://bugzilla.suse.com/1085583">SUSE bug 1085583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512308" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520272" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18241" ref_url="https://www.suse.com/security/cve/CVE-2017-18241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
    <description>
    fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18241/">CVE-2017-18241</cve>
	<bugzilla href="https://bugzilla.suse.com/1086400">SUSE bug 1086400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519726" comment="kernel-default-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519727" comment="kernel-default-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519728" comment="kernel-default-extra-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519729" comment="kernel-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519730" comment="kernel-macros-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519731" comment="kernel-source-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519732" comment="kernel-syms-4.4.138-94.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00022.html" source="SUSE-SU"/>
    <description>
    The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248</cve>
	<bugzilla href="https://bugzilla.suse.com/1087018">SUSE bug 1087018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087072">SUSE bug 1087072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519856" comment="cups-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519857" comment="cups-client-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519858" comment="cups-libs-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519859" comment="cups-libs-32bit-1.7.5-20.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
    <description>
    The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249</cve>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519726" comment="kernel-default-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519727" comment="kernel-default-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519728" comment="kernel-default-extra-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519729" comment="kernel-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519730" comment="kernel-macros-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519731" comment="kernel-source-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519732" comment="kernel-syms-4.4.138-94.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18250" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18250" ref_url="https://www.suse.com/security/cve/CVE-2017-18250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LogOpenCLBuildFailure in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18250/">CVE-2017-18250</cve>
	<bugzilla href="https://bugzilla.suse.com/1087039">SUSE bug 1087039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252</cve>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18253" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18253" ref_url="https://www.suse.com/security/cve/CVE-2017-18253" source="SUSE CVE"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LoadOpenCLDevices in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18253/">CVE-2017-18253</cve>
	<bugzilla href="https://bugzilla.suse.com/1087030">SUSE bug 1087030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18257" ref_url="https://www.suse.com/security/cve/CVE-2017-18257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
    <description>
    The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18257/">CVE-2017-18257</cve>
	<bugzilla href="https://bugzilla.suse.com/1088241">SUSE bug 1088241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520660" comment="kernel-default-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520661" comment="kernel-default-devel-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520662" comment="kernel-default-extra-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520663" comment="kernel-devel-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520664" comment="kernel-macros-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520665" comment="kernel-source-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520666" comment="kernel-syms-4.4.126-94.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00026.html" source="SUSE-SU"/>
    <description>
    The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520155" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520156" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520157" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520158" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18261" ref_url="https://www.suse.com/security/cve/CVE-2017-18261" source="SUSE CVE"/>
    <description>
    The arch_timer_reg_read_stable macro in arch/arm64/include/asm/arch_timer.h in the Linux kernel before 4.13 allows local users to cause a denial of service (infinite recursion) by writing to a file under /sys/kernel/debug in certain circumstances, as demonstrated by a scenario involving debugfs, ftrace, PREEMPT_TRACER, and FUNCTION_GRAPH_TRACER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18261/">CVE-2017-18261</cve>
	<bugzilla href="https://bugzilla.suse.com/1090225">SUSE bug 1090225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18266" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18266" ref_url="https://www.suse.com/security/cve/CVE-2017-18266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00009.html" source="SUSE-SU"/>
    <description>
    The open_envvar function in xdg-open in xdg-utils before 1.1.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by %s in this environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18266/">CVE-2017-18266</cve>
	<bugzilla href="https://bugzilla.suse.com/1093086">SUSE bug 1093086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177962" comment="xdg-utils-20140630-6.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519644" comment="xdg-utils-20140630-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00000.html" source="SUSE-SU"/>
    <description>
    An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18271" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted MIFF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271</cve>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18272" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18272" ref_url="https://www.suse.com/security/cve/CVE-2017-18272" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-25, there is a use-after-free in ReadOneMNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted MNG image file that is mishandled in an MngInfoDiscardObject call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18272/">CVE-2017-18272</cve>
	<bugzilla href="https://bugzilla.suse.com/1094221">SUSE bug 1094221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
    <description>
    The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent-&gt;sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519954" comment="kernel-default-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519955" comment="kernel-default-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519956" comment="kernel-default-extra-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519957" comment="kernel-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519958" comment="kernel-macros-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519959" comment="kernel-source-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519960" comment="kernel-syms-4.4.143-94.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18552" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18552" ref_url="https://www.suse.com/security/cve/CVE-2017-18552" source="SUSE CVE"/>
    <description>
    An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18552/">CVE-2017-18552</cve>
	<bugzilla href="https://bugzilla.suse.com/1146295">SUSE bug 1146295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2295" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00053.html" source="SUSE-SU"/>
    <description>
    Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295</cve>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517996" comment="puppet-3.8.5-15.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2354" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2356" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2362" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2363" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2364" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2366" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2371" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "WebKit" component, which allows remote attackers to launch popups via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2373" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2496" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2510" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with pageshow events.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "SQLite" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194085">SUSE bug 1194085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2538" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<bugzilla href="https://bugzilla.suse.com/1045460">SUSE bug 1045460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518257" comment="libjavascriptcoregtk-4_0-18-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518258" comment="libwebkit2gtk-4_0-37-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518259" comment="libwebkit2gtk3-lang-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518260" comment="typelib-1_0-JavaScriptCore-4_0-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518261" comment="typelib-1_0-WebKit2-4_0-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518262" comment="webkit2gtk-4_0-injected-bundles-2.18.0-2.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2539" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2579" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005619.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00056.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in netpbm before 10.61. The expandCodeOntoStack() function has an insufficient code value check, so that a maliciously crafted file could cause the application to crash or possibly allows code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521534" comment="libnetpbm11-10.66.3-8.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521535" comment="libnetpbm11-32bit-10.66.3-8.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521536" comment="netpbm-10.66.3-8.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2580" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005619.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00056.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521534" comment="libnetpbm11-10.66.3-8.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521535" comment="libnetpbm11-32bit-10.66.3-8.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521536" comment="netpbm-10.66.3-8.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2581" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1698-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00105.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009139268" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156953" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139269" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518733" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518734" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518735" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583</cve>
	<bugzilla href="https://bugzilla.suse.com/1020602">SUSE bug 1020602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2584" ref_url="https://www.suse.com/security/cve/CVE-2017-2584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2584/">CVE-2017-2584</cve>
	<bugzilla href="https://bugzilla.suse.com/1019851">SUSE bug 1019851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2586" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2586" ref_url="https://www.suse.com/security/cve/CVE-2017-2586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1698-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00105.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2586/">CVE-2017-2586</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024292">SUSE bug 1024292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009139268" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156953" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139269" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518733" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518734" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518735" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2587" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2587" ref_url="https://www.suse.com/security/cve/CVE-2017-2587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1698-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00105.html" source="SUSE-SU"/>
    <description>
    A memory allocation vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2587/">CVE-2017-2587</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024294">SUSE bug 1024294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009139268" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156953" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009139269" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518733" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518734" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518735" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2596" ref_url="https://www.suse.com/security/cve/CVE-2017-2596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel through 4.9.8 improperly emulates the VMXON instruction, which allows KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2596/">CVE-2017-2596</cve>
	<bugzilla href="https://bugzilla.suse.com/1022785">SUSE bug 1022785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0866-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00002.html" source="SUSE-SU"/>
    <description>
    A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123789">SUSE bug 1123789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159070" comment="libblkid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159071" comment="libblkid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159072" comment="libfdisk1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159073" comment="libmount1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159074" comment="libmount1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159075" comment="libsmartcols1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159649" comment="libuuid-devel-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159076" comment="libuuid1-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159077" comment="libuuid1-32bit-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159078" comment="python-libmount-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159079" comment="util-linux-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159080" comment="util-linux-lang-2.29.2-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159081" comment="util-linux-systemd-2.29.2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159082" comment="uuidd-2.29.2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512244" comment="libblkid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512245" comment="libblkid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512246" comment="libfdisk1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512247" comment="libmount1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512248" comment="libmount1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512249" comment="libsmartcols1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512250" comment="libuuid-devel-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512251" comment="libuuid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512252" comment="libuuid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512253" comment="python-libmount-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512254" comment="util-linux-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512255" comment="util-linux-lang-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512256" comment="util-linux-systemd-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512257" comment="uuidd-2.29.2-7.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517132" comment="libblkid1-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517133" comment="libblkid1-32bit-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517134" comment="libmount1-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517135" comment="libmount1-32bit-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517136" comment="libsmartcols1-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517137" comment="libuuid-devel-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517138" comment="libuuid1-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517139" comment="libuuid1-32bit-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517140" comment="python-libmount-2.25-40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517141" comment="util-linux-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517142" comment="util-linux-lang-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517143" comment="util-linux-systemd-2.25-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517144" comment="uuidd-2.25-40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518450" comment="libblkid1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518451" comment="libblkid1-32bit-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518452" comment="libfdisk1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518453" comment="libmount1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518454" comment="libmount1-32bit-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518455" comment="libsmartcols1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518456" comment="libuuid-devel-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518457" comment="libuuid1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518458" comment="libuuid1-32bit-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518459" comment="python-libmount-2.28-44.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518460" comment="util-linux-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518461" comment="util-linux-lang-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518462" comment="util-linux-systemd-2.28-44.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518463" comment="uuidd-2.28-44.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333935" comment="coreutils is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054017">SUSE bug 1054017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561998" comment="libdcerpc-binding0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561999" comment="libdcerpc-binding0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562000" comment="libdcerpc0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562001" comment="libdcerpc0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562002" comment="libgensec0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562003" comment="libgensec0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562004" comment="libndr-krb5pac0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562005" comment="libndr-krb5pac0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562006" comment="libndr-nbt0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562007" comment="libndr-nbt0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562008" comment="libndr-standard0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562009" comment="libndr-standard0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562010" comment="libndr0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562011" comment="libndr0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562012" comment="libnetapi0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562013" comment="libnetapi0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562014" comment="libregistry0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562015" comment="libsamba-credentials0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562016" comment="libsamba-credentials0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562017" comment="libsamba-hostconfig0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562018" comment="libsamba-hostconfig0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562019" comment="libsamba-passdb0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562020" comment="libsamba-passdb0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562021" comment="libsamba-util0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562022" comment="libsamba-util0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562023" comment="libsamdb0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562024" comment="libsamdb0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562025" comment="libsmbclient-raw0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562026" comment="libsmbclient-raw0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562027" comment="libsmbclient0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562028" comment="libsmbclient0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562029" comment="libsmbconf0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562030" comment="libsmbconf0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562031" comment="libsmbldap0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562032" comment="libsmbldap0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562033" comment="libtevent-util0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562034" comment="libtevent-util0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562035" comment="libwbclient0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562036" comment="libwbclient0-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562037" comment="samba-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562038" comment="samba-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562039" comment="samba-client-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562040" comment="samba-client-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562041" comment="samba-doc-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562042" comment="samba-libs-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562043" comment="samba-libs-32bit-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562044" comment="samba-winbind-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562045" comment="samba-winbind-32bit-4.2.4-28.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009562046" comment="libdcerpc-atsvc0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562047" comment="libdcerpc-binding0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562048" comment="libdcerpc-binding0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562049" comment="libdcerpc0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562050" comment="libdcerpc0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562051" comment="libndr-krb5pac0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562052" comment="libndr-krb5pac0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562053" comment="libndr-nbt0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562054" comment="libndr-nbt0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562055" comment="libndr-standard0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562056" comment="libndr-standard0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562057" comment="libndr0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562058" comment="libndr0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562059" comment="libnetapi0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562060" comment="libnetapi0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562061" comment="libsamba-credentials0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562062" comment="libsamba-credentials0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562063" comment="libsamba-errors0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562064" comment="libsamba-errors0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562065" comment="libsamba-hostconfig0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562066" comment="libsamba-hostconfig0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562067" comment="libsamba-passdb0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562068" comment="libsamba-passdb0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562069" comment="libsamba-util0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562070" comment="libsamba-util0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562071" comment="libsamdb0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562072" comment="libsamdb0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562073" comment="libsmbclient0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562074" comment="libsmbclient0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562075" comment="libsmbconf0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562076" comment="libsmbconf0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562077" comment="libsmbldap0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562078" comment="libsmbldap0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562079" comment="libtevent-util0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562080" comment="libtevent-util0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562081" comment="libwbclient0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562082" comment="libwbclient0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562083" comment="samba-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562084" comment="samba-client-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562085" comment="samba-client-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562086" comment="samba-doc-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562087" comment="samba-libs-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562088" comment="samba-libs-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562089" comment="samba-winbind-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562090" comment="samba-winbind-32bit-4.4.2-38.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1610-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00070.html" source="SUSE-SU"/>
    <description>
    It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517651" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517652" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003696.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1802-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00031.html" source="SUSE-SU"/>
    <description>
    It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123802">SUSE bug 1123802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815650">SUSE bug 815650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334055" comment="xorg-x11 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170842" comment="libXdmcp6-1.1.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170843" comment="libXdmcp6-32bit-1.1.1-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517908" comment="libXdmcp6-1.1.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517909" comment="libXdmcp6-32bit-1.1.1-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520247" comment="libXdmcp6-1.1.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520248" comment="libXdmcp6-32bit-1.1.1-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003695.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1801-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00030.html" source="SUSE-SU"/>
    <description>
    It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123800">SUSE bug 1123800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334055" comment="xorg-x11 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170845" comment="libICE6-1.0.8-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170846" comment="libICE6-32bit-1.0.8-12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517896" comment="libICE6-1.0.8-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517897" comment="libICE6-32bit-1.0.8-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520249" comment="libICE6-1.0.8-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520250" comment="libICE6-32bit-1.0.8-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2628" ref_url="https://www.suse.com/security/cve/CVE-2017-2628" source="SUSE CVE"/>
    <description>
    curl, as shipped in Red Hat Enterprise Linux 6 before version 7.19.7-53, did not correctly backport the fix for CVE-2015-3148 because it did not reflect the fact that the HAVE_GSSAPI define was meanwhile substituted by USE_HTTP_NEGOTIATE. This issue was introduced in RHEL 6.7 and affects RHEL 6 curl only.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2628/">CVE-2017-2628</cve>
	<bugzilla href="https://bugzilla.suse.com/1092962">SUSE bug 1092962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629" source="SUSE CVE"/>
    <description>
    curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629</cve>
	<bugzilla href="https://bugzilla.suse.com/1025379">SUSE bug 1025379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2630" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630" source="SUSE CVE"/>
    <description>
    A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630</cve>
	<bugzilla href="https://bugzilla.suse.com/1025396">SUSE bug 1025396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2633" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00022.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517318" comment="xen-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517319" comment="xen-kmp-default-4.5.5_10_k3.12.69_60.64.35-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517320" comment="xen-libs-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517321" comment="xen-libs-32bit-4.5.5_10-22.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2634" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2634" ref_url="https://www.suse.com/security/cve/CVE-2017-2634" source="SUSE CVE"/>
    <description>
    It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2634/">CVE-2017-2634</cve>
	<bugzilla href="https://bugzilla.suse.com/1026830">SUSE bug 1026830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635" source="SUSE CVE"/>
    <description>
    A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635</cve>
	<bugzilla href="https://bugzilla.suse.com/1027075">SUSE bug 1027075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0866-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027575">SUSE bug 1027575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028372">SUSE bug 1028372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517233" comment="kernel-default-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517234" comment="kernel-default-devel-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517235" comment="kernel-default-extra-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517236" comment="kernel-devel-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517237" comment="kernel-macros-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517238" comment="kernel-source-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517239" comment="kernel-syms-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517240" comment="kernel-xen-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517241" comment="kernel-xen-devel-3.12.69-60.64.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518538" comment="kernel-default-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518539" comment="kernel-default-devel-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518540" comment="kernel-default-extra-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518541" comment="kernel-devel-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518542" comment="kernel-macros-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518543" comment="kernel-source-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518544" comment="kernel-syms-4.4.49-92.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0892-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0925-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0973-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00012.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640</cve>
	<bugzilla href="https://bugzilla.suse.com/1028835">SUSE bug 1028835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2816" ref_url="https://www.suse.com/security/cve/CVE-2017-2816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004310.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00018.html" source="SUSE-SU"/>
    <description>
    An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2816/">CVE-2017-2816</cve>
	<bugzilla href="https://bugzilla.suse.com/1058673">SUSE bug 1058673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512360" comment="libofx-0.9.9-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512361" comment="libofx6-0.9.9-3.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519840" comment="libofx-0.9.9-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519841" comment="libofx6-0.9.9-3.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2834" ref_url="https://www.suse.com/security/cve/CVE-2017-2834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00006.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the authentication functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle attack to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2834/">CVE-2017-2834</cve>
	<bugzilla href="https://bugzilla.suse.com/1050714">SUSE bug 1050714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518037" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518038" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2835" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2835" ref_url="https://www.suse.com/security/cve/CVE-2017-2835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00006.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the RDP receive functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2835/">CVE-2017-2835</cve>
	<bugzilla href="https://bugzilla.suse.com/1050712">SUSE bug 1050712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518037" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518038" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2836" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2836" ref_url="https://www.suse.com/security/cve/CVE-2017-2836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00006.html" source="SUSE-SU"/>
    <description>
    An exploitable denial of service vulnerability exists within the reading of proprietary server certificates in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2836/">CVE-2017-2836</cve>
	<bugzilla href="https://bugzilla.suse.com/1050699">SUSE bug 1050699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518037" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518038" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2837" ref_url="https://www.suse.com/security/cve/CVE-2017-2837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00006.html" source="SUSE-SU"/>
    <description>
    An exploitable denial of service vulnerability exists within the handling of security data in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2837/">CVE-2017-2837</cve>
	<bugzilla href="https://bugzilla.suse.com/1050704">SUSE bug 1050704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050708">SUSE bug 1050708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518037" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518038" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2838" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2838" ref_url="https://www.suse.com/security/cve/CVE-2017-2838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00006.html" source="SUSE-SU"/>
    <description>
    An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2838/">CVE-2017-2838</cve>
	<bugzilla href="https://bugzilla.suse.com/1050708">SUSE bug 1050708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518037" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518038" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2839" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2839" ref_url="https://www.suse.com/security/cve/CVE-2017-2839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00006.html" source="SUSE-SU"/>
    <description>
    An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2839/">CVE-2017-2839</cve>
	<bugzilla href="https://bugzilla.suse.com/1050711">SUSE bug 1050711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518037" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518038" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518059" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518060" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518061" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518062" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518063" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518059" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518060" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518061" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518062" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518063" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00042.html" source="SUSE-SU"/>
    <description>
    An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512472" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512473" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512474" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512475" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518001" comment="libsoup-2_4-1-2.54.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518002" comment="libsoup-2_4-1-32bit-2.54.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518003" comment="libsoup-lang-2.54.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518004" comment="typelib-1_0-Soup-2_4-2.54.1-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519873" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519874" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519876" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2888" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2888" ref_url="https://www.suse.com/security/cve/CVE-2017-2888" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2895-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00113.html" source="SUSE-SU"/>
    <description>
    An exploitable integer overflow vulnerability exists when creating a new RGB Surface in SDL 2.0.5. A specially crafted file can cause an integer overflow resulting in too little memory being allocated which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2888/">CVE-2017-2888</cve>
	<bugzilla href="https://bugzilla.suse.com/1062777">SUSE bug 1062777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062784">SUSE bug 1062784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334058" comment="SDL is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2920" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2920" ref_url="https://www.suse.com/security/cve/CVE-2017-2920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004310.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00018.html" source="SUSE-SU"/>
    <description>
    An memory corruption vulnerability exists in the .SVG parsing functionality of Computerinsel Photoline 20.02. A specially crafted .SVG file can cause a vulnerability resulting in memory corruption, which can potentially lead to arbitrary code execution. An attacker can send a specific .SVG file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2920/">CVE-2017-2920</cve>
	<bugzilla href="https://bugzilla.suse.com/1061964">SUSE bug 1061964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512360" comment="libofx-0.9.9-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512361" comment="libofx6-0.9.9-3.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519840" comment="libofx-0.9.9-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519841" comment="libofx6-0.9.9-3.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2925" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2925" ref_url="https://www.suse.com/security/cve/CVE-2017-2925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability in the JPEG XR codec. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2925/">CVE-2017-2925</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2926" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2926" ref_url="https://www.suse.com/security/cve/CVE-2017-2926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to processing of atoms in MP4 files. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2926/">CVE-2017-2926</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2927" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2927" ref_url="https://www.suse.com/security/cve/CVE-2017-2927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2927/">CVE-2017-2927</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2928" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2928" ref_url="https://www.suse.com/security/cve/CVE-2017-2928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to setting visual mode effects. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2928/">CVE-2017-2928</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2930" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2930" ref_url="https://www.suse.com/security/cve/CVE-2017-2930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability due to a concurrency error when manipulating a display list. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2930/">CVE-2017-2930</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2931" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2931" ref_url="https://www.suse.com/security/cve/CVE-2017-2931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to the parsing of SWF metadata. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2931/">CVE-2017-2931</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2932" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2932" ref_url="https://www.suse.com/security/cve/CVE-2017-2932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript MovieClip class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2932/">CVE-2017-2932</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2933" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2933" ref_url="https://www.suse.com/security/cve/CVE-2017-2933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability related to texture compression. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2933/">CVE-2017-2933</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2934" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2934" ref_url="https://www.suse.com/security/cve/CVE-2017-2934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when parsing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2934/">CVE-2017-2934</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2935" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2935" ref_url="https://www.suse.com/security/cve/CVE-2017-2935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing the Flash Video container file format. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2935/">CVE-2017-2935</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2936" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2936" ref_url="https://www.suse.com/security/cve/CVE-2017-2936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2936/">CVE-2017-2936</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2937" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2937" ref_url="https://www.suse.com/security/cve/CVE-2017-2937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class, when using class inheritance. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2937/">CVE-2017-2937</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2938" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2938" ref_url="https://www.suse.com/security/cve/CVE-2017-2938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have a security bypass vulnerability related to handling TCP connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2938/">CVE-2017-2938</cve>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2982" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2982" ref_url="https://www.suse.com/security/cve/CVE-2017-2982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability in a routine related to player shutdown. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2982/">CVE-2017-2982</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2985" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2985" ref_url="https://www.suse.com/security/cve/CVE-2017-2985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability in the ActionScript 3 BitmapData class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2985/">CVE-2017-2985</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2986" ref_url="https://www.suse.com/security/cve/CVE-2017-2986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable heap overflow vulnerability in the Flash Video (FLV) codec. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2986/">CVE-2017-2986</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2987" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2987" ref_url="https://www.suse.com/security/cve/CVE-2017-2987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable integer overflow vulnerability related to Flash Broker COM. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2987/">CVE-2017-2987</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2988" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2988" ref_url="https://www.suse.com/security/cve/CVE-2017-2988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability when performing garbage collection. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2988/">CVE-2017-2988</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2990" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2990" ref_url="https://www.suse.com/security/cve/CVE-2017-2990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in the h264 decompression routine. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2990/">CVE-2017-2990</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2991" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2991" ref_url="https://www.suse.com/security/cve/CVE-2017-2991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in the h264 codec (related to decompression). Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2991/">CVE-2017-2991</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2992" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2992" ref_url="https://www.suse.com/security/cve/CVE-2017-2992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable heap overflow vulnerability when parsing an MP4 header. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2992/">CVE-2017-2992</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2993" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2993" ref_url="https://www.suse.com/security/cve/CVE-2017-2993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability related to event handlers. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2993/">CVE-2017-2993</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2994" ref_url="https://www.suse.com/security/cve/CVE-2017-2994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability in Primetime SDK event dispatch. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2994/">CVE-2017-2994</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2995" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2995" ref_url="https://www.suse.com/security/cve/CVE-2017-2995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable type confusion vulnerability related to the MessageChannel class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2995/">CVE-2017-2995</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2996" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2996" ref_url="https://www.suse.com/security/cve/CVE-2017-2996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in Primetime SDK. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2996/">CVE-2017-2996</cve>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2997" ref_url="https://www.suse.com/security/cve/CVE-2017-2997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable buffer overflow / underflow vulnerability in the Primetime TVSDK that supports customizing ad information. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2997/">CVE-2017-2997</cve>
	<bugzilla href="https://bugzilla.suse.com/1029374">SUSE bug 1029374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517171" comment="flash-player-25.0.0.127-162.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517172" comment="flash-player-gnome-25.0.0.127-162.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2998" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2998" ref_url="https://www.suse.com/security/cve/CVE-2017-2998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK API functionality related to timeline interactions. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2998/">CVE-2017-2998</cve>
	<bugzilla href="https://bugzilla.suse.com/1029374">SUSE bug 1029374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517171" comment="flash-player-25.0.0.127-162.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517172" comment="flash-player-gnome-25.0.0.127-162.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2999" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2999" ref_url="https://www.suse.com/security/cve/CVE-2017-2999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK functionality related to hosting playback surface. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2999/">CVE-2017-2999</cve>
	<bugzilla href="https://bugzilla.suse.com/1029374">SUSE bug 1029374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517171" comment="flash-player-25.0.0.127-162.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517172" comment="flash-player-gnome-25.0.0.127-162.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3000" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3000" ref_url="https://www.suse.com/security/cve/CVE-2017-3000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.221 and earlier have a vulnerability in the random number generator used for constant blinding. Successful exploitation could lead to information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3000/">CVE-2017-3000</cve>
	<bugzilla href="https://bugzilla.suse.com/1029374">SUSE bug 1029374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517171" comment="flash-player-25.0.0.127-162.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517172" comment="flash-player-gnome-25.0.0.127-162.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3001" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3001" ref_url="https://www.suse.com/security/cve/CVE-2017-3001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to garbage collection in the ActionScript 2 VM. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3001/">CVE-2017-3001</cve>
	<bugzilla href="https://bugzilla.suse.com/1029374">SUSE bug 1029374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517171" comment="flash-player-25.0.0.127-162.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517172" comment="flash-player-gnome-25.0.0.127-162.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3002" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3002" ref_url="https://www.suse.com/security/cve/CVE-2017-3002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability in the ActionScript2 TextField object related to the variable property. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3002/">CVE-2017-3002</cve>
	<bugzilla href="https://bugzilla.suse.com/1029374">SUSE bug 1029374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517171" comment="flash-player-25.0.0.127-162.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517172" comment="flash-player-gnome-25.0.0.127-162.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3003" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3003" ref_url="https://www.suse.com/security/cve/CVE-2017-3003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to an interaction between the privacy user interface and the ActionScript 2 Camera object. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3003/">CVE-2017-3003</cve>
	<bugzilla href="https://bugzilla.suse.com/1029374">SUSE bug 1029374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517171" comment="flash-player-25.0.0.127-162.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517172" comment="flash-player-gnome-25.0.0.127-162.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3058" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3058" ref_url="https://www.suse.com/security/cve/CVE-2017-3058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the sound class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3058/">CVE-2017-3058</cve>
	<bugzilla href="https://bugzilla.suse.com/1033619">SUSE bug 1033619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517259" comment="flash-player-25.0.0.148-165.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517260" comment="flash-player-gnome-25.0.0.148-165.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3059" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3059" ref_url="https://www.suse.com/security/cve/CVE-2017-3059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the internal script object. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3059/">CVE-2017-3059</cve>
	<bugzilla href="https://bugzilla.suse.com/1033619">SUSE bug 1033619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517259" comment="flash-player-25.0.0.148-165.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517260" comment="flash-player-gnome-25.0.0.148-165.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3060" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3060" ref_url="https://www.suse.com/security/cve/CVE-2017-3060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3060/">CVE-2017-3060</cve>
	<bugzilla href="https://bugzilla.suse.com/1033619">SUSE bug 1033619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517259" comment="flash-player-25.0.0.148-165.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517260" comment="flash-player-gnome-25.0.0.148-165.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3061" ref_url="https://www.suse.com/security/cve/CVE-2017-3061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the SWF parser. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3061/">CVE-2017-3061</cve>
	<bugzilla href="https://bugzilla.suse.com/1033619">SUSE bug 1033619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517259" comment="flash-player-25.0.0.148-165.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517260" comment="flash-player-gnome-25.0.0.148-165.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3062" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3062" ref_url="https://www.suse.com/security/cve/CVE-2017-3062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in ActionScript2 when creating a getter/setter property. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3062/">CVE-2017-3062</cve>
	<bugzilla href="https://bugzilla.suse.com/1033619">SUSE bug 1033619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517259" comment="flash-player-25.0.0.148-165.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517260" comment="flash-player-gnome-25.0.0.148-165.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3063" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3063" ref_url="https://www.suse.com/security/cve/CVE-2017-3063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the ActionScript2 NetStream class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3063/">CVE-2017-3063</cve>
	<bugzilla href="https://bugzilla.suse.com/1033619">SUSE bug 1033619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517259" comment="flash-player-25.0.0.148-165.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517260" comment="flash-player-gnome-25.0.0.148-165.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3064" ref_url="https://www.suse.com/security/cve/CVE-2017-3064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability when parsing a shape outline. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3064/">CVE-2017-3064</cve>
	<bugzilla href="https://bugzilla.suse.com/1033619">SUSE bug 1033619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517259" comment="flash-player-25.0.0.148-165.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517260" comment="flash-player-gnome-25.0.0.148-165.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3068" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3068" ref_url="https://www.suse.com/security/cve/CVE-2017-3068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Advanced Video Coding engine. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3068/">CVE-2017-3068</cve>
	<bugzilla href="https://bugzilla.suse.com/1038281">SUSE bug 1038281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517335" comment="flash-player-25.0.0.171-168.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517336" comment="flash-player-gnome-25.0.0.171-168.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3069" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3069" ref_url="https://www.suse.com/security/cve/CVE-2017-3069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BlendMode class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3069/">CVE-2017-3069</cve>
	<bugzilla href="https://bugzilla.suse.com/1038281">SUSE bug 1038281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517335" comment="flash-player-25.0.0.171-168.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517336" comment="flash-player-gnome-25.0.0.171-168.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3070" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3070" ref_url="https://www.suse.com/security/cve/CVE-2017-3070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the ConvolutionFilter class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3070/">CVE-2017-3070</cve>
	<bugzilla href="https://bugzilla.suse.com/1038281">SUSE bug 1038281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517335" comment="flash-player-25.0.0.171-168.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517336" comment="flash-player-gnome-25.0.0.171-168.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3071" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3071" ref_url="https://www.suse.com/security/cve/CVE-2017-3071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when masking display objects. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3071/">CVE-2017-3071</cve>
	<bugzilla href="https://bugzilla.suse.com/1038281">SUSE bug 1038281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517335" comment="flash-player-25.0.0.171-168.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517336" comment="flash-player-gnome-25.0.0.171-168.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3072" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3072" ref_url="https://www.suse.com/security/cve/CVE-2017-3072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3072/">CVE-2017-3072</cve>
	<bugzilla href="https://bugzilla.suse.com/1038281">SUSE bug 1038281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517335" comment="flash-player-25.0.0.171-168.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517336" comment="flash-player-gnome-25.0.0.171-168.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3073" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3073" ref_url="https://www.suse.com/security/cve/CVE-2017-3073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when handling multiple mask properties of display objects, aka memory corruption. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3073/">CVE-2017-3073</cve>
	<bugzilla href="https://bugzilla.suse.com/1038281">SUSE bug 1038281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517335" comment="flash-player-25.0.0.171-168.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517336" comment="flash-player-gnome-25.0.0.171-168.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3074" ref_url="https://www.suse.com/security/cve/CVE-2017-3074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Graphics class. Successful exploitation could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3074/">CVE-2017-3074</cve>
	<bugzilla href="https://bugzilla.suse.com/1038281">SUSE bug 1038281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517335" comment="flash-player-25.0.0.171-168.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517336" comment="flash-player-gnome-25.0.0.171-168.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00012.html" source="SUSE-SU"/>
    <description>
    Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -&gt; 9.9.9-S7, 9.9.3 -&gt; 9.9.9-P5, 9.9.10b1, 9.10.0 -&gt; 9.10.4-P5, 9.10.5b1, 9.11.0 -&gt; 9.11.0-P2, 9.11.1b1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517151" comment="bind-libs-9.9.9P1-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517152" comment="bind-libs-32bit-9.9.9P1-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517153" comment="bind-utils-9.9.9P1-56.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -&gt; 9.8.8-P1, 9.9.0 -&gt; 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.0 -&gt; 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0 -&gt; 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, 9.9.3-S1 -&gt; 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517261" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517262" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517263" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
    <description>
    Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, and 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517261" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517262" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517263" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
    <description>
    named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has created a situation under which some versions of named can be caused to exit with a REQUIRE assertion failure if they are sent a null command string. Affects BIND 9.9.9-&gt;9.9.9-P7, 9.9.10b1-&gt;9.9.10rc2, 9.10.4-&gt;9.10.4-P7, 9.10.5b1-&gt;9.10.5rc2, 9.11.0-&gt;9.11.0-P4, 9.11.1b1-&gt;9.11.1rc2, 9.9.9-S1-&gt;9.9.9-S9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517261" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517262" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517263" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="TID7021041" ref_url="https://www.suse.com/support/kb/doc/?id=7021041" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00007.html" source="SUSE-SU"/>
    <description>
    An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517668" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517669" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517670" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="TID7021041" ref_url="https://www.suse.com/support/kb/doc/?id=7021041" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00007.html" source="SUSE-SU"/>
    <description>
    An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517668" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517669" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517670" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00101.html" source="SUSE-SU"/>
    <description>
    A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518961" comment="dhcp-4.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518962" comment="dhcp-client-4.3.3-10.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00105.html" source="SUSE-SU"/>
    <description>
    BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101131">SUSE bug 1101131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518819" comment="bind-libs-9.9.9P1-63.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518820" comment="bind-libs-32bit-9.9.9P1-63.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518821" comment="bind-utils-9.9.9P1-63.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3157" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3157" ref_url="https://www.suse.com/security/cve/CVE-2017-3157" source="SUSE CVE"/>
    <description>
    By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3157/">CVE-2017-3157</cve>
	<bugzilla href="https://bugzilla.suse.com/1026640">SUSE bug 1026640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3251" ref_url="https://www.suse.com/security/cve/CVE-2017-3251" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.9 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3251/">CVE-2017-3251</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020888">SUSE bug 1020888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3256" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3256" ref_url="https://www.suse.com/security/cve/CVE-2017-3256" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3256/">CVE-2017-3256</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020883">SUSE bug 1020883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020878">SUSE bug 1020878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3259" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3259" ref_url="https://www.suse.com/security/cve/CVE-2017-3259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 3.7 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3259/">CVE-2017-3259</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3273" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3273" ref_url="https://www.suse.com/security/cve/CVE-2017-3273" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3273/">CVE-2017-3273</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020876">SUSE bug 1020876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517368" comment="libmysqlclient18-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517369" comment="libmysqlclient18-32bit-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517370" comment="libmysqlclient_r18-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517371" comment="libmysqlclient_r18-32bit-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517372" comment="mariadb-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517373" comment="mariadb-client-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517374" comment="mariadb-errormessages-10.0.30-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3305" ref_url="https://www.suse.com/security/cve/CVE-2017-3305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client, aka, "The Riddle".
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3305/">CVE-2017-3305</cve>
	<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037590">SUSE bug 1037590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517951" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517952" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517953" comment="libmysqlclient_r18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517954" comment="libmysqlclient_r18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517955" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517956" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517957" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517951" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517952" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517953" comment="libmysqlclient_r18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517954" comment="libmysqlclient_r18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517955" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517956" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517957" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517368" comment="libmysqlclient18-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517369" comment="libmysqlclient18-32bit-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517370" comment="libmysqlclient_r18-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517371" comment="libmysqlclient_r18-32bit-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517372" comment="mariadb-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517373" comment="mariadb-client-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517374" comment="mariadb-errormessages-10.0.30-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3319" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3319" ref_url="https://www.suse.com/security/cve/CVE-2017-3319" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: X Plugin). Supported versions that are affected are 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 3.1 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3319/">CVE-2017-3319</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020898">SUSE bug 1020898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3320" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3320" ref_url="https://www.suse.com/security/cve/CVE-2017-3320" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 2.4 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3320/">CVE-2017-3320</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020901">SUSE bug 1020901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517951" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517952" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517953" comment="libmysqlclient_r18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517954" comment="libmysqlclient_r18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517955" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517956" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517957" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517951" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517952" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517953" comment="libmysqlclient_r18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517954" comment="libmysqlclient_r18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517955" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517956" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517957" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517951" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517952" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517953" comment="libmysqlclient_r18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517954" comment="libmysqlclient_r18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517955" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517956" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517957" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3512" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3514" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519165" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519166" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519167" comment="libmysqlclient_r18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519168" comment="libmysqlclient_r18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519169" comment="mariadb-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519170" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519171" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519165" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519166" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519167" comment="libmysqlclient_r18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519168" comment="libmysqlclient_r18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519169" comment="mariadb-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519170" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519171" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519165" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519166" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519167" comment="libmysqlclient_r18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519168" comment="libmysqlclient_r18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519169" comment="mariadb-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519170" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519171" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3730" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3730" ref_url="https://www.suse.com/security/cve/CVE-2017-3730" source="SUSE CVE"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
    <description>
    In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3730/">CVE-2017-3730</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022084">SUSE bug 1022084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0487-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064118">SUSE bug 1064118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517093" comment="libopenssl1_0_0-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517094" comment="libopenssl1_0_0-32bit-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517095" comment="openssl-1.0.1i-54.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518446" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518447" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518448" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518449" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022086">SUSE bug 1022086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049418">SUSE bug 1049418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049421">SUSE bug 1049421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518446" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518447" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518448" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518449" comment="openssl-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3733" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3733" ref_url="https://www.suse.com/security/cve/CVE-2017-3733" source="SUSE CVE"/>
    <description>
    During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3733/">CVE-2017-3733</cve>
	<bugzilla href="https://bugzilla.suse.com/1025661">SUSE bug 1025661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064200">SUSE bug 1064200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2968-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7022367" ref_url="https://www.suse.com/support/kb/doc/?id=7022367" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00113.html" source="SUSE-SU"/>
    <description>
    While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518373" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518374" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518375" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518376" comment="openssl-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518373" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518374" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518375" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518376" comment="openssl-1.0.2j-60.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7022367" ref_url="https://www.suse.com/support/kb/doc/?id=7022367" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00113.html" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518373" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518374" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518375" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518376" comment="openssl-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518373" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518374" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518375" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518376" comment="openssl-1.0.2j-60.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="TID7022464" ref_url="https://www.suse.com/support/kb/doc/?id=7022464" source="SUSE-SU"/>
		<reference ref_id="TID7022626" ref_url="https://www.suse.com/support/kb/doc/?id=7022626" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00069.html" source="SUSE-SU"/>
    <description>
    OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737</cve>
	<bugzilla href="https://bugzilla.suse.com/1071905">SUSE bug 1071905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518399" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518400" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518401" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518402" comment="openssl-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518399" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518400" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518401" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518402" comment="openssl-1.0.2j-60.20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7022464" ref_url="https://www.suse.com/support/kb/doc/?id=7022464" source="SUSE-SU"/>
		<reference ref_id="TID7022627" ref_url="https://www.suse.com/support/kb/doc/?id=7022627" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00113.html" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097757">SUSE bug 1097757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518399" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518400" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518401" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518402" comment="openssl-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518399" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518400" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518401" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518402" comment="openssl-1.0.2j-60.20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<bugzilla href="https://bugzilla.suse.com/1028848">SUSE bug 1028848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028875">SUSE bug 1028875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155536" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155537" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155538" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517365" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517366" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517367" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5031" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5031" ref_url="https://www.suse.com/security/cve/CVE-2017-5031" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00016.html" source="SUSE-SU"/>
    <description>
    A use after free in ANGLE in Google Chrome prior to 57.0.2987.98 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5031/">CVE-2017-5031</cve>
	<bugzilla href="https://bugzilla.suse.com/1028848">SUSE bug 1028848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028875">SUSE bug 1028875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5123" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5123" ref_url="https://www.suse.com/security/cve/CVE-2017-5123" source="SUSE CVE"/>
    <description>
    Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5123/">CVE-2017-5123</cve>
	<bugzilla href="https://bugzilla.suse.com/1062473">SUSE bug 1062473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00036.html" source="SUSE-SU"/>
    <description>
    An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<bugzilla href="https://bugzilla.suse.com/1064066">SUSE bug 1064066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064089">SUSE bug 1064089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518877" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518878" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518879" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518880" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0428-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<bugzilla href="https://bugzilla.suse.com/1019531">SUSE bug 1019531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021610">SUSE bug 1021610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155695" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517397" comment="libplist++1-1.8-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517398" comment="libplist1-1.8-10.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518636" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518637" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0512-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00091.html" source="SUSE-SU"/>
    <description>
    LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517091" comment="libtiff5-4.0.7-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517092" comment="libtiff5-32bit-4.0.7-40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5334" ref_url="https://www.suse.com/security/cve/CVE-2017-5334" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5334/">CVE-2017-5334</cve>
	<bugzilla href="https://bugzilla.suse.com/1018831">SUSE bug 1018831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517069" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517070" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517071" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517069" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517070" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517071" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517069" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517070" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517071" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5374" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5374" ref_url="https://www.suse.com/security/cve/CVE-2017-5374" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 50.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5374/">CVE-2017-5374</cve>
	<bugzilla href="https://bugzilla.suse.com/1021841">SUSE bug 1021841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5377" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5377" ref_url="https://www.suse.com/security/cve/CVE-2017-5377" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A memory corruption vulnerability in Skia that can occur when using transforms to make gradients, resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5377/">CVE-2017-5377</cve>
	<bugzilla href="https://bugzilla.suse.com/1021826">SUSE bug 1021826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5379" ref_url="https://www.suse.com/security/cve/CVE-2017-5379" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Web Animations when interacting with cycle collection found through fuzzing. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5379/">CVE-2017-5379</cve>
	<bugzilla href="https://bugzilla.suse.com/1021827">SUSE bug 1021827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5381" ref_url="https://www.suse.com/security/cve/CVE-2017-5381" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The "export" function in the Certificate Viewer can force local filesystem navigation when the "common name" in a certificate contains slashes, allowing certificate content to be saved in unsafe locations with an arbitrary filename. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5381/">CVE-2017-5381</cve>
	<bugzilla href="https://bugzilla.suse.com/1021830">SUSE bug 1021830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5382" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5382" ref_url="https://www.suse.com/security/cve/CVE-2017-5382" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Feed preview for RSS feeds can be used to capture errors and exceptions generated by privileged content, allowing for the exposure of internal information not meant to be seen by web content. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5382/">CVE-2017-5382</cve>
	<bugzilla href="https://bugzilla.suse.com/1021831">SUSE bug 1021831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5384" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5384" ref_url="https://www.suse.com/security/cve/CVE-2017-5384" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5384/">CVE-2017-5384</cve>
	<bugzilla href="https://bugzilla.suse.com/1021832">SUSE bug 1021832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5385" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5385" ref_url="https://www.suse.com/security/cve/CVE-2017-5385" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5385/">CVE-2017-5385</cve>
	<bugzilla href="https://bugzilla.suse.com/1021833">SUSE bug 1021833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR &lt; 45.7 and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5387" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5387" ref_url="https://www.suse.com/security/cve/CVE-2017-5387" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The existence of a specifically requested local file can be found due to the double firing of the "onerror" when the "source" attribute on a "&lt;track&gt;" tag refers to a file that does not exist if the source page is loaded locally. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5387/">CVE-2017-5387</cve>
	<bugzilla href="https://bugzilla.suse.com/1021839">SUSE bug 1021839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5388" ref_url="https://www.suse.com/security/cve/CVE-2017-5388" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A STUN server in conjunction with a large number of "webkitRTCPeerConnection" objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5388/">CVE-2017-5388</cve>
	<bugzilla href="https://bugzilla.suse.com/1021840">SUSE bug 1021840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5389" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5389" ref_url="https://www.suse.com/security/cve/CVE-2017-5389" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5389/">CVE-2017-5389</cve>
	<bugzilla href="https://bugzilla.suse.com/1021828">SUSE bug 1021828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5391" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5391" ref_url="https://www.suse.com/security/cve/CVE-2017-5391" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Special "about:" pages used by web content, such as RSS feeds, can load privileged "about:" pages in an iframe. If a content-injection bug were found in one of those pages this could allow for potential privilege escalation. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5391/">CVE-2017-5391</cve>
	<bugzilla href="https://bugzilla.suse.com/1021835">SUSE bug 1021835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5392" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5392" ref_url="https://www.suse.com/security/cve/CVE-2017-5392" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Weak proxy objects have weak references on multiple threads when they should only have them on one, resulting in incorrect memory usage and corruption, which leads to potentially exploitable crashes. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5392/">CVE-2017-5392</cve>
	<bugzilla href="https://bugzilla.suse.com/1021836">SUSE bug 1021836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5393" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5393" ref_url="https://www.suse.com/security/cve/CVE-2017-5393" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The "mozAddonManager" allows for the installation of extensions from the CDN for addons.mozilla.org, a publicly accessible site. This could allow malicious extensions to install additional extensions from the CDN in combination with an XSS attack on Mozilla AMO sites. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5393/">CVE-2017-5393</cve>
	<bugzilla href="https://bugzilla.suse.com/1021837">SUSE bug 1021837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5394" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5394" ref_url="https://www.suse.com/security/cve/CVE-2017-5394" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A location bar spoofing attack where the location bar of loaded page will be shown over the content of another tab due to a series of JavaScript events combined with fullscreen mode. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5394/">CVE-2017-5394</cve>
	<bugzilla href="https://bugzilla.suse.com/1021834">SUSE bug 1021834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5395" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5395" ref_url="https://www.suse.com/security/cve/CVE-2017-5395" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Malicious sites can display a spoofed location bar on a subsequently loaded page when the existing location bar on the new page is scrolled out of view if navigations between pages can be timed correctly. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5395/">CVE-2017-5395</cve>
	<bugzilla href="https://bugzilla.suse.com/1021838">SUSE bug 1021838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5397" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5397" ref_url="https://www.suse.com/security/cve/CVE-2017-5397" source="SUSE CVE"/>
    <description>
    The cache directory on the local file system is set to be world writable. Firefox defaults to extracting libraries from this cache. This allows for the possibility of an installed malicious application or tools with write access to the file system to replace files used by Firefox with their own versions. This vulnerability affects Firefox &lt; 51.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5397/">CVE-2017-5397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5409" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
    <description>
    The Mozilla Windows updater can be called by a non-privileged user to delete an arbitrary local file by passing a special path to the callback parameter through the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 45.8 and Firefox &lt; 52.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5428" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00021.html" source="SUSE-SU"/>
    <description>
    An integer overflow in "createImageBitmap()" was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the "createImageBitmap" API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer. This vulnerability affects Firefox ESR &lt; 52.0.1 and Firefox &lt; 52.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428</cve>
	<bugzilla href="https://bugzilla.suse.com/1029822">SUSE bug 1029822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5430" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035204">SUSE bug 1035204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154911" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154912" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174098" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174099" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517322" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517323" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517322" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517323" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5437" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-10195, CVE-2016-10196, CVE-2016-10197.  Reason: This candidate is a duplicate of CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197.  Notes: All CVE users should reference CVE-2016-10195, CVE-2016-10196, and/or CVE-2016-10197 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability while parsing "application/http-index-format" format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A vulnerability while parsing "application/http-index-format" format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read when an HTTP/2 connection to a servers sends "DATA" frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. The "ClearKeyDecryptor" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5455" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
    <description>
    The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR &lt; 52.1 and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
    <description>
    A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR &lt; 52.1 and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read while processing SVG content in "ConvolvePixel". This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    If a page is loaded from an original site through a hyperlink and contains a redirect to a "data:text/html" URL, triggering a reload will run the reloaded "data:text/html" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5498" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    libjasper/include/jasper/jas_math.h in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517251" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517252" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5506" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5507" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5508" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the PushQuantumPixel function in ImageMagick before 6.9.7-3 and 7.x before 7.0.4-3 allows remote attackers to cause a denial of service (application crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5509" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5509" ref_url="https://www.suse.com/security/cve/CVE-2017-5509" source="SUSE CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5509/">CVE-2017-5509</cve>
	<bugzilla href="https://bugzilla.suse.com/1020445">SUSE bug 1020445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5510" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5510" ref_url="https://www.suse.com/security/cve/CVE-2017-5510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5510/">CVE-2017-5510</cve>
	<bugzilla href="https://bugzilla.suse.com/1020446">SUSE bug 1020446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5511" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5525" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<bugzilla href="https://bugzilla.suse.com/1020491">SUSE bug 1020491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<bugzilla href="https://bugzilla.suse.com/1020589">SUSE bug 1020589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519535" comment="xen-4.9.0_14-3.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519536" comment="xen-libs-4.9.0_14-3.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519537" comment="xen-libs-32bit-4.9.0_14-3.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5545" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0428-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<bugzilla href="https://bugzilla.suse.com/1021610">SUSE bug 1021610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155695" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517397" comment="libplist++1-1.8-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517398" comment="libplist1-1.8-10.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518636" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518637" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5547" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5547" ref_url="https://www.suse.com/security/cve/CVE-2017-5547" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-corsair.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5547/">CVE-2017-5547</cve>
	<bugzilla href="https://bugzilla.suse.com/1021252">SUSE bug 1021252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5548" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5548" ref_url="https://www.suse.com/security/cve/CVE-2017-5548" source="SUSE CVE"/>
    <description>
    drivers/net/ieee802154/atusb.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5548/">CVE-2017-5548</cve>
	<bugzilla href="https://bugzilla.suse.com/1021255">SUSE bug 1021255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5550" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5550" ref_url="https://www.suse.com/security/cve/CVE-2017-5550" source="SUSE CVE"/>
    <description>
    Off-by-one error in the pipe_advance function in lib/iov_iter.c in the Linux kernel before 4.9.5 allows local users to obtain sensitive information from uninitialized heap-memory locations in opportunistic circumstances by reading from a pipe after an incorrect buffer-release decision.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5550/">CVE-2017-5550</cve>
	<bugzilla href="https://bugzilla.suse.com/1021257">SUSE bug 1021257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5552" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_resource_attach_backing function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<bugzilla href="https://bugzilla.suse.com/1021195">SUSE bug 1021195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5576" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5576" ref_url="https://www.suse.com/security/cve/CVE-2017-5576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5576/">CVE-2017-5576</cve>
	<bugzilla href="https://bugzilla.suse.com/1021294">SUSE bug 1021294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5577" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5577" ref_url="https://www.suse.com/security/cve/CVE-2017-5577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
    <description>
    The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5577/">CVE-2017-5577</cve>
	<bugzilla href="https://bugzilla.suse.com/1021294">SUSE bug 1021294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5578" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virtio_gpu_resource_attach_backing function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<bugzilla href="https://bugzilla.suse.com/1021481">SUSE bug 1021481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5579" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022627">SUSE bug 1022627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5580" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5580" ref_url="https://www.suse.com/security/cve/CVE-2017-5580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5580/">CVE-2017-5580</cve>
	<bugzilla href="https://bugzilla.suse.com/1021627">SUSE bug 1021627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00010.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00010.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5618" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5618" ref_url="https://www.suse.com/security/cve/CVE-2017-5618" source="SUSE CVE"/>
    <description>
    GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5618/">CVE-2017-5618</cve>
	<bugzilla href="https://bugzilla.suse.com/1021743">SUSE bug 1021743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334061" comment="screen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5667" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<bugzilla href="https://bugzilla.suse.com/1022541">SUSE bug 1022541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669</cve>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102390">SUSE bug 1102390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1571-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2631-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7022982" ref_url="https://www.suse.com/support/kb/doc/?id=7022982" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU--1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0030-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00080.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074919">SUSE bug 1074919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075007">SUSE bug 1075007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076115">SUSE bug 1076115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076372">SUSE bug 1076372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078353">SUSE bug 1078353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126516">SUSE bug 1126516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512204" comment="kernel-firmware-20180525-3.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512205" comment="ucode-amd-20180525-3.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512625" comment="ucode-intel-20180807a-13.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519174" comment="kernel-firmware-20170530-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519128" comment="libvirt-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519129" comment="libvirt-client-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519130" comment="libvirt-client-32bit-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519131" comment="libvirt-daemon-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519132" comment="libvirt-daemon-config-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519133" comment="libvirt-daemon-config-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519134" comment="libvirt-daemon-driver-interface-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519135" comment="libvirt-daemon-driver-libxl-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519136" comment="libvirt-daemon-driver-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519137" comment="libvirt-daemon-driver-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519138" comment="libvirt-daemon-driver-nodedev-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519139" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519140" comment="libvirt-daemon-driver-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519141" comment="libvirt-daemon-driver-secret-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519142" comment="libvirt-daemon-driver-storage-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519143" comment="libvirt-daemon-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519144" comment="libvirt-daemon-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519145" comment="libvirt-daemon-xen-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519146" comment="libvirt-doc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519175" comment="ucode-amd-20170530-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519024" comment="ucode-intel-20180312-13.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520603" comment="libvirt-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520604" comment="libvirt-admin-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520605" comment="libvirt-client-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520606" comment="libvirt-daemon-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520607" comment="libvirt-daemon-config-network-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520608" comment="libvirt-daemon-config-nwfilter-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520609" comment="libvirt-daemon-driver-interface-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520610" comment="libvirt-daemon-driver-libxl-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520611" comment="libvirt-daemon-driver-lxc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520612" comment="libvirt-daemon-driver-network-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520613" comment="libvirt-daemon-driver-nodedev-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520614" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520615" comment="libvirt-daemon-driver-qemu-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520616" comment="libvirt-daemon-driver-secret-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520617" comment="libvirt-daemon-driver-storage-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520618" comment="libvirt-daemon-driver-storage-core-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520619" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520620" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520621" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520622" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520623" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520624" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520625" comment="libvirt-daemon-lxc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520626" comment="libvirt-daemon-qemu-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520627" comment="libvirt-daemon-xen-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520628" comment="libvirt-doc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520629" comment="libvirt-libs-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519024" comment="ucode-intel-20180312-13.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520630" comment="virt-install-1.4.1-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520631" comment="virt-manager-1.4.1-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520632" comment="virt-manager-common-1.4.1-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00059.html" source="SUSE-SU"/>
    <description>
    Bounds checking in Tianocompress before November 7, 2017 may allow an authenticated user to potentially enable an escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521809" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5732" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00059.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521809" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5733" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00059.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521809" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5734" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00059.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521809" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5735" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00059.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521809" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IDOTKMILRKOFD2ODQXJF3OOEYZ3EMR5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MOJKTUHVZFZADZQ6EYELCLEJ5BD766Q/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518756" comment="kernel-default-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518757" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518758" comment="kernel-default-extra-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518762" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519733" comment="kernel-default-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519734" comment="kernel-default-devel-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519735" comment="kernel-default-extra-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519736" comment="kernel-devel-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519737" comment="kernel-macros-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519738" comment="kernel-source-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519739" comment="kernel-syms-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075008">SUSE bug 1075008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518756" comment="kernel-default-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518757" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518758" comment="kernel-default-extra-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518762" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519733" comment="kernel-default-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519734" comment="kernel-default-devel-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519735" comment="kernel-default-extra-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519736" comment="kernel-devel-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519737" comment="kernel-macros-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519738" comment="kernel-source-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519739" comment="kernel-syms-4.4.103-6.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<bugzilla href="https://bugzilla.suse.com/1023848">SUSE bug 1023848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155695" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517397" comment="libplist++1-1.8-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517398" comment="libplist1-1.8-10.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518636" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518637" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5835" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<bugzilla href="https://bugzilla.suse.com/1023822">SUSE bug 1023822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155695" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517397" comment="libplist++1-1.8-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517398" comment="libplist1-1.8-10.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518636" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518637" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5836" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<bugzilla href="https://bugzilla.suse.com/1023807">SUSE bug 1023807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023848">SUSE bug 1023848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155695" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517397" comment="libplist++1-1.8-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517398" comment="libplist1-1.8-10.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518636" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518637" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0574-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1079-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00095.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted video file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154327" comment="gstreamer-0_10-plugins-base-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154328" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154329" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154408" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154409" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154410" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154330" comment="libgstapp-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154331" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154411" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154412" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154413" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154414" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154415" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154416" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154332" comment="libgstinterfaces-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154333" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154417" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154418" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154419" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154420" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154421" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154422" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154423" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154424" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154425" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154426" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154427" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154428" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154429" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154430" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517264" comment="gstreamer-0_10-plugins-base-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517265" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517266" comment="gstreamer-0_10-plugins-base-lang-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517273" comment="gstreamer-plugins-base-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517274" comment="gstreamer-plugins-base-lang-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517275" comment="libgstallocators-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517267" comment="libgstapp-0_10-0-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517268" comment="libgstapp-0_10-0-32bit-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517276" comment="libgstapp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517277" comment="libgstapp-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517278" comment="libgstaudio-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517279" comment="libgstaudio-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517280" comment="libgstfft-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517281" comment="libgstfft-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517269" comment="libgstinterfaces-0_10-0-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517270" comment="libgstinterfaces-0_10-0-32bit-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517282" comment="libgstpbutils-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517283" comment="libgstpbutils-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517284" comment="libgstriff-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517285" comment="libgstrtp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517286" comment="libgstrtsp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517287" comment="libgstsdp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517288" comment="libgsttag-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517289" comment="libgsttag-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517290" comment="libgstvideo-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517291" comment="libgstvideo-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517292" comment="typelib-1_0-GstAudio-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517293" comment="typelib-1_0-GstPbutils-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517294" comment="typelib-1_0-GstTag-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517295" comment="typelib-1_0-GstVideo-1_0-1.2.4-2.6.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518572" comment="gstreamer-0_10-plugins-base-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518573" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518574" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518581" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518583" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518575" comment="libgstapp-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518576" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518584" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518585" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518586" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518587" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518588" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518589" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518577" comment="libgstinterfaces-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518578" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518590" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518591" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518592" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518593" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518594" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518595" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518596" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518597" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518598" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518599" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518600" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518601" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518602" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518603" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5838" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002792.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0580-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00058.html" source="SUSE-SU"/>
    <description>
    The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024051">SUSE bug 1024051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150843" comment="gstreamer-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150844" comment="gstreamer-lang-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150845" comment="gstreamer-utils-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150846" comment="libgstreamer-1_0-0-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150847" comment="libgstreamer-1_0-0-32bit-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150848" comment="typelib-1_0-Gst-1_0-1.8.3-9.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517253" comment="gstreamer-1.2.4-2.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517254" comment="gstreamer-lang-1.2.4-2.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517255" comment="gstreamer-utils-1.2.4-2.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517256" comment="libgstreamer-1_0-0-1.2.4-2.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517257" comment="libgstreamer-1_0-0-32bit-1.2.4-2.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517258" comment="typelib-1_0-Gst-1_0-1.2.4-2.3.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518563" comment="gstreamer-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518564" comment="gstreamer-lang-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518565" comment="gstreamer-utils-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518566" comment="libgstreamer-1_0-0-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518567" comment="libgstreamer-1_0-0-32bit-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518568" comment="typelib-1_0-Gst-1_0-1.8.3-9.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0574-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00095.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 does not properly limit recursion, which allows remote attackers to cause a denial of service (stack overflow and crash) via vectors involving nested WAVEFORMATEX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024047">SUSE bug 1024047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154408" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154409" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154410" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154411" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154412" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154413" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154414" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154415" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154416" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154417" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154418" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154419" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154420" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154421" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154422" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154423" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154424" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154425" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154426" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154427" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154428" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154429" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154430" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517273" comment="gstreamer-plugins-base-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517274" comment="gstreamer-plugins-base-lang-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517275" comment="libgstallocators-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517276" comment="libgstapp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517277" comment="libgstapp-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517278" comment="libgstaudio-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517279" comment="libgstaudio-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517280" comment="libgstfft-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517281" comment="libgstfft-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517282" comment="libgstpbutils-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517283" comment="libgstpbutils-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517284" comment="libgstriff-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517285" comment="libgstrtp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517286" comment="libgstrtsp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517287" comment="libgstsdp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517288" comment="libgsttag-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517289" comment="libgsttag-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517290" comment="libgstvideo-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517291" comment="libgstvideo-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517292" comment="typelib-1_0-GstAudio-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517293" comment="typelib-1_0-GstPbutils-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517294" comment="typelib-1_0-GstTag-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517295" comment="typelib-1_0-GstVideo-1_0-1.2.4-2.6.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518581" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518583" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518584" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518585" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518586" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518587" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518588" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518589" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518590" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518591" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518592" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518593" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518594" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518595" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518596" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518597" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518598" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518599" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518600" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518601" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518602" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518603" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving the current stts index.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024034">SUSE bug 1024034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517271" comment="gstreamer-plugins-good-1.2.4-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517272" comment="gstreamer-plugins-good-lang-1.2.4-2.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518579" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving ncdt tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024030">SUSE bug 1024030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334063" comment="gstreamer-plugins-good is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518579" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0574-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00095.html" source="SUSE-SU"/>
    <description>
    The html_context_handle_element function in gst/subparse/samiparse.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted SMI file, as demonstrated by OneNote_Manager.smi.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024041">SUSE bug 1024041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154408" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154409" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154410" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154411" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154412" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154413" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154414" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154415" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154416" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154417" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154418" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154419" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154420" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154421" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154422" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154423" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154424" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154425" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154426" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154427" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154428" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154429" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154430" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517273" comment="gstreamer-plugins-base-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517274" comment="gstreamer-plugins-base-lang-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517275" comment="libgstallocators-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517276" comment="libgstapp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517277" comment="libgstapp-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517278" comment="libgstaudio-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517279" comment="libgstaudio-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517280" comment="libgstfft-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517281" comment="libgstfft-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517282" comment="libgstpbutils-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517283" comment="libgstpbutils-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517284" comment="libgstriff-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517285" comment="libgstrtp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517286" comment="libgstrtsp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517287" comment="libgstsdp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517288" comment="libgsttag-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517289" comment="libgsttag-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517290" comment="libgstvideo-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517291" comment="libgstvideo-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517292" comment="typelib-1_0-GstAudio-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517293" comment="typelib-1_0-GstPbutils-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517294" comment="typelib-1_0-GstTag-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517295" comment="typelib-1_0-GstVideo-1_0-1.2.4-2.6.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518581" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518583" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518584" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518585" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518586" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518587" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518588" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518589" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518590" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518591" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518592" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518593" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518594" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518595" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518596" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518597" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518598" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518599" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518600" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518601" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518602" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518603" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00059.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) gst_mini_object_unref, (2) gst_tag_list_unref, and (3) gst_mxf_demux_update_essence_tracks functions in GStreamer before 1.10.3 allow remote attackers to cause a denial of service (crash) via vectors involving stream tags, as demonstrated by 02785736.mxf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024044">SUSE bug 1024044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334064" comment="gstreamer-plugins-bad is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518551" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518552" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518553" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518554" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518555" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518556" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518557" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518558" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518559" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518560" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518561" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518562" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0574-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1079-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00095.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted ASF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154327" comment="gstreamer-0_10-plugins-base-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154328" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154329" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154408" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154409" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154410" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154330" comment="libgstapp-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154331" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154411" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154412" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154413" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154414" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154415" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154416" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154332" comment="libgstinterfaces-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154333" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154417" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154418" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154419" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154420" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154421" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154422" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154423" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154424" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154425" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154426" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154427" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154428" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154429" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154430" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517264" comment="gstreamer-0_10-plugins-base-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517265" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517266" comment="gstreamer-0_10-plugins-base-lang-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517273" comment="gstreamer-plugins-base-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517274" comment="gstreamer-plugins-base-lang-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517275" comment="libgstallocators-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517267" comment="libgstapp-0_10-0-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517268" comment="libgstapp-0_10-0-32bit-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517276" comment="libgstapp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517277" comment="libgstapp-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517278" comment="libgstaudio-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517279" comment="libgstaudio-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517280" comment="libgstfft-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517281" comment="libgstfft-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517269" comment="libgstinterfaces-0_10-0-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517270" comment="libgstinterfaces-0_10-0-32bit-0.10.36-11.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517282" comment="libgstpbutils-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517283" comment="libgstpbutils-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517284" comment="libgstriff-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517285" comment="libgstrtp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517286" comment="libgstrtsp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517287" comment="libgstsdp-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517288" comment="libgsttag-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517289" comment="libgsttag-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517290" comment="libgstvideo-1_0-0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517291" comment="libgstvideo-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517292" comment="typelib-1_0-GstAudio-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517293" comment="typelib-1_0-GstPbutils-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517294" comment="typelib-1_0-GstTag-1_0-1.2.4-2.6.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517295" comment="typelib-1_0-GstVideo-1_0-1.2.4-2.6.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518572" comment="gstreamer-0_10-plugins-base-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518573" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518574" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518581" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518583" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518575" comment="libgstapp-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518576" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518584" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518585" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518586" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518587" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518588" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518589" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518577" comment="libgstinterfaces-0_10-0-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518578" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518590" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518591" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518592" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518593" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518594" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518595" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518596" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518597" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518598" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518599" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518600" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518601" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518602" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518603" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a ncdt sub-tag that "goes behind" the surrounding tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334063" comment="gstreamer-plugins-good is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518579" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00059.html" source="SUSE-SU"/>
    <description>
    The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024068">SUSE bug 1024068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334064" comment="gstreamer-plugins-bad is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518551" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518552" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518553" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518554" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518555" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518556" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518557" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518558" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518559" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518560" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518561" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518562" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5852" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5852" ref_url="https://www.suse.com/security/cve/CVE-2017-5852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The PoDoFo::PdfPage::GetInheritedKeyFromObject function in base/PdfVariant.cpp in PoDoFo 0.9.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5852/">CVE-2017-5852</cve>
	<bugzilla href="https://bugzilla.suse.com/1023067">SUSE bug 1023067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5853" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5853" ref_url="https://www.suse.com/security/cve/CVE-2017-5853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Integer overflow in base/PdfParser.cpp in PoDoFo 0.9.4 allows remote attackers to have unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5853/">CVE-2017-5853</cve>
	<bugzilla href="https://bugzilla.suse.com/1023069">SUSE bug 1023069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5854" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5854" ref_url="https://www.suse.com/security/cve/CVE-2017-5854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    base/PdfOutputStream.cpp in PoDoFo 0.9.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5854/">CVE-2017-5854</cve>
	<bugzilla href="https://bugzilla.suse.com/1023070">SUSE bug 1023070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096890">SUSE bug 1096890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5855" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5855" ref_url="https://www.suse.com/security/cve/CVE-2017-5855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The PoDoFo::PdfParser::ReadXRefSubsection function in PdfParser.cpp in PoDoFo 0.9.4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5855/">CVE-2017-5855</cve>
	<bugzilla href="https://bugzilla.suse.com/1023071">SUSE bug 1023071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5856" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024186">SUSE bug 1024186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5857" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<bugzilla href="https://bugzilla.suse.com/1023073">SUSE bug 1023073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5886" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5886" ref_url="https://www.suse.com/security/cve/CVE-2017-5886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the PoDoFo::PdfTokenizer::GetNextToken function in PdfTokenizer.cpp in PoDoFo 0.9.4 allows remote attackers to have unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5886/">CVE-2017-5886</cve>
	<bugzilla href="https://bugzilla.suse.com/1023380">SUSE bug 1023380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084902">SUSE bug 1084902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897</cve>
	<bugzilla href="https://bugzilla.suse.com/1023762">SUSE bug 1023762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5931" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931" source="SUSE CVE"/>
    <description>
    Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code on the host via a crafted virtio-crypto request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931</cve>
	<bugzilla href="https://bugzilla.suse.com/1024114">SUSE bug 1024114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5932" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5932" ref_url="https://www.suse.com/security/cve/CVE-2017-5932" source="SUSE CVE"/>
    <description>
    The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5932/">CVE-2017-5932</cve>
	<bugzilla href="https://bugzilla.suse.com/1024171">SUSE bug 1024171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334330" comment="bash is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5937" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    The util_format_is_pure_uint function in vrend_renderer.c in Virgil 3d project (aka virglrenderer) 0.6.0 and earlier allows local guest OS users to cause a denial of service (NULL pointer dereference) via a crafted VIRGL_CCMD_CLEAR command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937</cve>
	<bugzilla href="https://bugzilla.suse.com/1024232">SUSE bug 1024232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041089">SUSE bug 1041089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5950" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003791.html" source="SUSE-SU"/>
    <description>
    The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950</cve>
	<bugzilla href="https://bugzilla.suse.com/1032144">SUSE bug 1032144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172757" comment="libyaml-cpp0_5-0.5.3-3.3.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518992" comment="libyaml-cpp0_5-0.5.3-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<bugzilla href="https://bugzilla.suse.com/1032114">SUSE bug 1032114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517452" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517453" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0511-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1811-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00039.html" source="SUSE-SU"/>
    <description>
    vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123143">SUSE bug 1123143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173534">SUSE bug 1173534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157587" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157588" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157589" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517664" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517665" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517666" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5956" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5956" ref_url="https://www.suse.com/security/cve/CVE-2017-5956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    The vrend_draw_vbo function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors involving vertext_buffer_index.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5956/">CVE-2017-5956</cve>
	<bugzilla href="https://bugzilla.suse.com/1024992">SUSE bug 1024992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5957" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the vrend_decode_set_framebuffer_state function in vrend_decode.c in virglrenderer before 926b9b3460a48f6454d8bbe9e44313d86a65447f, as used in Quick Emulator (QEMU), allows a local guest users to cause a denial of service (application crash) via the "nr_cbufs" argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957</cve>
	<bugzilla href="https://bugzilla.suse.com/1024993">SUSE bug 1024993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5967" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5967" ref_url="https://www.suse.com/security/cve/CVE-2017-5967" source="SUSE CVE"/>
    <description>
    The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5967/">CVE-2017-5967</cve>
	<bugzilla href="https://bugzilla.suse.com/1025209">SUSE bug 1025209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1746-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00000.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document.  NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517647" comment="libxml2-2-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517648" comment="libxml2-2-32bit-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517649" comment="libxml2-tools-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517650" comment="python-libxml2-2.9.4-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0763-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025013">SUSE bug 1025013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517114" comment="kernel-default-3.12.69-60.64.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517115" comment="kernel-default-devel-3.12.69-60.64.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517116" comment="kernel-default-extra-3.12.69-60.64.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517117" comment="kernel-devel-3.12.69-60.64.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517118" comment="kernel-macros-3.12.69-60.64.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517119" comment="kernel-source-3.12.69-60.64.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517120" comment="kernel-syms-3.12.69-60.64.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517121" comment="kernel-xen-3.12.69-60.64.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517122" comment="kernel-xen-devel-3.12.69-60.64.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5973" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025188">SUSE bug 1025188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5974" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5974" ref_url="https://www.suse.com/security/cve/CVE-2017-5974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the __zzip_get32 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5974/">CVE-2017-5974</cve>
	<bugzilla href="https://bugzilla.suse.com/1024517">SUSE bug 1024517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5975" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5975" ref_url="https://www.suse.com/security/cve/CVE-2017-5975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the __zzip_get64 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5975/">CVE-2017-5975</cve>
	<bugzilla href="https://bugzilla.suse.com/1024528">SUSE bug 1024528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5976" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5976" ref_url="https://www.suse.com/security/cve/CVE-2017-5976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5976/">CVE-2017-5976</cve>
	<bugzilla href="https://bugzilla.suse.com/1024531">SUSE bug 1024531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5977" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5977" ref_url="https://www.suse.com/security/cve/CVE-2017-5977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    The zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5977/">CVE-2017-5977</cve>
	<bugzilla href="https://bugzilla.suse.com/1024534">SUSE bug 1024534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5978" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5978" ref_url="https://www.suse.com/security/cve/CVE-2017-5978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    The zzip_mem_entry_new function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5978/">CVE-2017-5978</cve>
	<bugzilla href="https://bugzilla.suse.com/1024533">SUSE bug 1024533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5979" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5979" ref_url="https://www.suse.com/security/cve/CVE-2017-5979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    The prescan_entry function in fseeko.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5979/">CVE-2017-5979</cve>
	<bugzilla href="https://bugzilla.suse.com/1024535">SUSE bug 1024535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5980" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5980" ref_url="https://www.suse.com/security/cve/CVE-2017-5980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    The zzip_mem_entry_new function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5980/">CVE-2017-5980</cve>
	<bugzilla href="https://bugzilla.suse.com/1024536">SUSE bug 1024536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5981" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5981" ref_url="https://www.suse.com/security/cve/CVE-2017-5981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    seeko.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (assertion failure and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5981/">CVE-2017-5981</cve>
	<bugzilla href="https://bugzilla.suse.com/1024539">SUSE bug 1024539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5987" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local OS guest privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors involving the transfer mode register during multi block transfer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<bugzilla href="https://bugzilla.suse.com/1025311">SUSE bug 1025311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5993" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993</cve>
	<bugzilla href="https://bugzilla.suse.com/1025505">SUSE bug 1025505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994</cve>
	<bugzilla href="https://bugzilla.suse.com/1025507">SUSE bug 1025507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6000" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6000" ref_url="https://www.suse.com/security/cve/CVE-2017-6000" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6000/">CVE-2017-6000</cve>
	<bugzilla href="https://bugzilla.suse.com/1025594">SUSE bug 1025594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6001" ref_url="https://www.suse.com/security/cve/CVE-2017-6001" source="SUSE CVE"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6001/">CVE-2017-6001</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025626">SUSE bug 1025626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6014" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058" source="SUSE CVE"/>
    <description>
    Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058</cve>
	<bugzilla href="https://bugzilla.suse.com/1025837">SUSE bug 1025837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="TID7018645" ref_url="https://www.suse.com/support/kb/doc/?id=7018645" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6181" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6181" ref_url="https://www.suse.com/security/cve/CVE-2017-6181" source="SUSE CVE"/>
    <description>
    The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6181/">CVE-2017-6181</cve>
	<bugzilla href="https://bugzilla.suse.com/1033625">SUSE bug 1033625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6196" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6196" ref_url="https://www.suse.com/security/cve/CVE-2017-6196" source="SUSE CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the gx_image_enum_begin function in base/gxipixel.c in Ghostscript before ecceafe3abba2714ef9b432035fe0739d9b1a283 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6196/">CVE-2017-6196</cve>
	<bugzilla href="https://bugzilla.suse.com/1027039">SUSE bug 1027039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6209" ref_url="https://www.suse.com/security/cve/CVE-2017-6209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6209/">CVE-2017-6209</cve>
	<bugzilla href="https://bugzilla.suse.com/1026723">SUSE bug 1026723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6210" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6210" ref_url="https://www.suse.com/security/cve/CVE-2017-6210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6210/">CVE-2017-6210</cve>
	<bugzilla href="https://bugzilla.suse.com/1026725">SUSE bug 1026725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6311" ref_url="https://www.suse.com/security/cve/CVE-2017-6311" source="SUSE CVE"/>
    <description>
    gdk-pixbuf-thumbnailer.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to printing an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6311/">CVE-2017-6311</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027027">SUSE bug 1027027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333994" comment="gdk-pixbuf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6312" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518059" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518060" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518061" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518062" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518063" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6313" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518059" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518060" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518061" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518062" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518063" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6314" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    The make_available_at_least function in io-tiff.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518059" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518060" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518061" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518062" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518063" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6317" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6317" ref_url="https://www.suse.com/security/cve/CVE-2017-6317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the add_shader_program function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via vectors involving the sprog variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6317/">CVE-2017-6317</cve>
	<bugzilla href="https://bugzilla.suse.com/1026922">SUSE bug 1026922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6318" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0649-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00016.html" source="SUSE-SU"/>
    <description>
    saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009149621" comment="sane-backends-1.0.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149622" comment="sane-backends-32bit-1.0.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149623" comment="sane-backends-autoconfig-1.0.24-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517175" comment="sane-backends-1.0.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517176" comment="sane-backends-32bit-1.0.24-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517177" comment="sane-backends-autoconfig-1.0.24-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6345" ref_url="https://www.suse.com/security/cve/CVE-2017-6345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6345/">CVE-2017-6345</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027190">SUSE bug 1027190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6346" ref_url="https://www.suse.com/security/cve/CVE-2017-6346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6346/">CVE-2017-6346</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027189">SUSE bug 1027189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064392">SUSE bug 1064392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6347" ref_url="https://www.suse.com/security/cve/CVE-2017-6347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6347/">CVE-2017-6347</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348</cve>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1811-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00039.html" source="SUSE-SU"/>
    <description>
    An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<bugzilla href="https://bugzilla.suse.com/1027057">SUSE bug 1027057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157587" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157588" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157589" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517664" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517665" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517666" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1811-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00039.html" source="SUSE-SU"/>
    <description>
    An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<bugzilla href="https://bugzilla.suse.com/1027053">SUSE bug 1027053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157587" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157588" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157589" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517664" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517665" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517666" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6355" ref_url="https://www.suse.com/security/cve/CVE-2017-6355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the vrend_create_shader function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (process crash) via crafted pkt_length and offlen values, which trigger an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6355/">CVE-2017-6355</cve>
	<bugzilla href="https://bugzilla.suse.com/1027108">SUSE bug 1027108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00054.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<bugzilla href="https://bugzilla.suse.com/1056993">SUSE bug 1056993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518754" comment="gd-2.1.0-24.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518755" comment="gd-32bit-2.1.0-24.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6369" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6369" ref_url="https://www.suse.com/security/cve/CVE-2017-6369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002843.html" source="SUSE-SU"/>
    <description>
    Insufficient checks in the UDF subsystem in Firebird 2.5.x before 2.5.7 and 3.0.x before 3.0.2 allow remote authenticated users to execute code by using a 'system' entrypoint from fbudf.so.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6369/">CVE-2017-6369</cve>
	<bugzilla href="https://bugzilla.suse.com/1023990">SUSE bug 1023990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154924" comment="libfbembed2_5-2.5.2.26539-15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517333" comment="libfbembed2_5-2.5.2.26539-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_OBJECT_VERTEX_ELEMENTS commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386</cve>
	<bugzilla href="https://bugzilla.suse.com/1027376">SUSE bug 1027376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6414" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vcard_apdu_new function in card_7816.c in libcacard before 2.5.3 allows local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<bugzilla href="https://bugzilla.suse.com/1027514">SUSE bug 1027514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517318" comment="xen-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517319" comment="xen-kmp-default-4.5.5_10_k3.12.69_60.64.35-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517320" comment="xen-libs-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517321" comment="xen-libs-32bit-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6418" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
    <description>
    mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519046" comment="clamav-0.99.4-33.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6420" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory corruption) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435</cve>
	<bugzilla href="https://bugzilla.suse.com/1029639">SUSE bug 1029639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518026" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518027" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436</cve>
	<bugzilla href="https://bugzilla.suse.com/1029751">SUSE bug 1029751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518026" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518027" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6437" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    The base64encode function in base64.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds read) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437</cve>
	<bugzilla href="https://bugzilla.suse.com/1029707">SUSE bug 1029707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518026" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518027" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6438" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_unicode_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds write) and possibly code execution via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438</cve>
	<bugzilla href="https://bugzilla.suse.com/1029706">SUSE bug 1029706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518026" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518027" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6439" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds write) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439</cve>
	<bugzilla href="https://bugzilla.suse.com/1029638">SUSE bug 1029638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518026" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518027" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The parse_data_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<bugzilla href="https://bugzilla.suse.com/1029631">SUSE bug 1029631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029706">SUSE bug 1029706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155695" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517397" comment="libplist++1-1.8-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517398" comment="libplist1-1.8-10.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518636" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518637" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6451" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds memory write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6460" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6497" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6497" ref_url="https://www.suse.com/security/cve/CVE-2017-6497" source="SUSE CVE"/>
    <description>
    An issue was discovered in ImageMagick 6.9.7. A specially crafted psd file could lead to a NULL pointer dereference (thus, a DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6497/">CVE-2017-6497</cve>
	<bugzilla href="https://bugzilla.suse.com/1028087">SUSE bug 1028087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6498" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6498" ref_url="https://www.suse.com/security/cve/CVE-2017-6498" source="SUSE CVE"/>
    <description>
    An issue was discovered in ImageMagick 6.9.7. Incorrect TGA files could trigger assertion failures, thus leading to DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6498/">CVE-2017-6498</cve>
	<bugzilla href="https://bugzilla.suse.com/1028085">SUSE bug 1028085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6499" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6499" ref_url="https://www.suse.com/security/cve/CVE-2017-6499" source="SUSE CVE"/>
    <description>
    An issue was discovered in Magick++ in ImageMagick 6.9.7. A specially crafted file creating a nested exception could lead to a memory leak (thus, a DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6499/">CVE-2017-6499</cve>
	<bugzilla href="https://bugzilla.suse.com/1028083">SUSE bug 1028083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6501" ref_url="https://www.suse.com/security/cve/CVE-2017-6501" source="SUSE CVE"/>
    <description>
    An issue was discovered in ImageMagick 6.9.7. A specially crafted xcf file could lead to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6501/">CVE-2017-6501</cve>
	<bugzilla href="https://bugzilla.suse.com/1028071">SUSE bug 1028071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6502" ref_url="https://www.suse.com/security/cve/CVE-2017-6502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 6.9.7. A specially crafted webp file could lead to a file-descriptor leak in libmagickcore (thus, a DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6502/">CVE-2017-6502</cve>
	<bugzilla href="https://bugzilla.suse.com/1028075">SUSE bug 1028075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517318" comment="xen-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517319" comment="xen-kmp-default-4.5.5_10_k3.12.69_60.64.35-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517320" comment="xen-libs-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517321" comment="xen-libs-32bit-4.5.5_10-22.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518569" comment="xen-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518570" comment="xen-libs-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518571" comment="xen-libs-32bit-4.7.2_02-36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/1029696">SUSE bug 1029696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009158932" comment="apparmor-docs-2.8.2-49.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158933" comment="apparmor-parser-2.8.2-49.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158934" comment="apparmor-profiles-2.8.2-49.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158935" comment="apparmor-utils-2.8.2-49.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158936" comment="libapparmor1-2.8.2-49.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158937" comment="libapparmor1-32bit-2.8.2-49.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158938" comment="pam_apparmor-2.8.2-49.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158939" comment="pam_apparmor-32bit-2.8.2-49.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009158940" comment="perl-apparmor-2.8.2-49.21 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517324" comment="apparmor-docs-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517325" comment="apparmor-parser-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517326" comment="apparmor-profiles-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517327" comment="apparmor-utils-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517328" comment="libapparmor1-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517329" comment="libapparmor1-32bit-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517330" comment="pam_apparmor-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517331" comment="pam_apparmor-32bit-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517332" comment="perl-apparmor-2.8.2-54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0890-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00113.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159418">SUSE bug 1159418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517180" comment="wget-1.14-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/1042218">SUSE bug 1042218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518319" comment="perl-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518320" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518321" comment="perl-base-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6519" ref_url="https://www.suse.com/security/cve/CVE-2017-6519" source="SUSE CVE"/>
    <description>
    avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6519/">CVE-2017-6519</cve>
	<bugzilla href="https://bugzilla.suse.com/1037001">SUSE bug 1037001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338989" comment="avahi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the MSADPCM::initializeCoefficients function in MSADPCM.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the readValue function in FileHandle.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    The decodeSample function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the alaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the decodeBlock in MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    The runPull function in libaudiofile/modules/BlockCodec.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ulaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    The reset1 function in libaudiofile/modules/BlockCodec.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Expand3To4Module::run function in libaudiofile/modules/SimpleModule.h in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Integer overflow in sfcommands/sfconvert.c in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Integer overflow in modules/MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6840" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6840" ref_url="https://www.suse.com/security/cve/CVE-2017-6840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The ColorChanger::GetColorFromStack function in colorchanger.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (invalid read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6840/">CVE-2017-6840</cve>
	<bugzilla href="https://bugzilla.suse.com/1027787">SUSE bug 1027787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6844" ref_url="https://www.suse.com/security/cve/CVE-2017-6844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the PoDoFo::PdfParser::ReadXRefSubsection function in PdfParser.cpp in PoDoFo 0.9.4 allows remote attackers to have unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6844/">CVE-2017-6844</cve>
	<bugzilla href="https://bugzilla.suse.com/1027782">SUSE bug 1027782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6845" ref_url="https://www.suse.com/security/cve/CVE-2017-6845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The PoDoFo::PdfColor::operator function in PdfColor.cpp in PoDoFo 0.9.4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6845/">CVE-2017-6845</cve>
	<bugzilla href="https://bugzilla.suse.com/1027779">SUSE bug 1027779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027781">SUSE bug 1027781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6846" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6846" ref_url="https://www.suse.com/security/cve/CVE-2017-6846" source="SUSE CVE"/>
    <description>
    The GraphicsStack::TGraphicsStackElement::SetNonStrokingColorSpace function in graphicsstack.h in PoDoFo 0.9.4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6846/">CVE-2017-6846</cve>
	<bugzilla href="https://bugzilla.suse.com/1029856">SUSE bug 1029856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338990" comment="podofo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6847" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6847" ref_url="https://www.suse.com/security/cve/CVE-2017-6847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The PoDoFo::PdfVariant::DelayedLoad function in PdfVariant.h in PoDoFo 0.9.4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6847/">CVE-2017-6847</cve>
	<bugzilla href="https://bugzilla.suse.com/1027778">SUSE bug 1027778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6850" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517251" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517252" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6874" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6874" ref_url="https://www.suse.com/security/cve/CVE-2017-6874" source="SUSE CVE"/>
    <description>
    Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6874/">CVE-2017-6874</cve>
	<bugzilla href="https://bugzilla.suse.com/1029314">SUSE bug 1029314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6886" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6886" ref_url="https://www.suse.com/security/cve/CVE-2017-6886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00111.html" source="SUSE-SU"/>
    <description>
    An error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to corrupt memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6886/">CVE-2017-6886</cve>
	<bugzilla href="https://bugzilla.suse.com/1039380">SUSE bug 1039380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6887" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6887" ref_url="https://www.suse.com/security/cve/CVE-2017-6887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00111.html" source="SUSE-SU"/>
    <description>
    A boundary error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to "DSLR-A100" and containing multiple sequences of 0x100 and 0x14A TAGs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6887/">CVE-2017-6887</cve>
	<bugzilla href="https://bugzilla.suse.com/1039379">SUSE bug 1039379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6889" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6889" ref_url="https://www.suse.com/security/cve/CVE-2017-6889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00111.html" source="SUSE-SU"/>
    <description>
    An integer overflow error within the "foveon_load_camf()" function (dcraw_foveon.c) in LibRaw-demosaic-pack-GPL2 before 0.18.2 can be exploited to cause a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6889/">CVE-2017-6889</cve>
	<bugzilla href="https://bugzilla.suse.com/1039210">SUSE bug 1039210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6890" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6890" ref_url="https://www.suse.com/security/cve/CVE-2017-6890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00111.html" source="SUSE-SU"/>
    <description>
    A boundary error within the "foveon_load_camf()" function (dcraw_foveon.c) when initializing a huffman table in LibRaw-demosaic-pack-GPL2 before 0.18.2 can be exploited to cause a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6890/">CVE-2017-6890</cve>
	<bugzilla href="https://bugzilla.suse.com/1039209">SUSE bug 1039209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" source="SUSE-SU"/>
    <description>
    Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149679">SUSE bug 1149679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521215" comment="libtasn1-4.9-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521216" comment="libtasn1-6-4.9-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521217" comment="libtasn1-6-32bit-4.9-3.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6892" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    In libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892</cve>
	<bugzilla href="https://bugzilla.suse.com/1043978">SUSE bug 1043978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518830" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518831" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6899" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6899" ref_url="https://www.suse.com/security/cve/CVE-2017-6899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
    <description>
    The msm_bus_dbg_update_request_write function in drivers/platform/msm/msm_bus/msm_bus_dbg.c in android_kernel_huawei_msm8916 through 2017-06-16 in LineageOS, and possibly other kernels for MSM devices, allows attackers to cause a denial of service (NULL pointer dereference and device crash) via a crafted /sys/kernel/debug/msm-bus-dbg/client-data/update-request write request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6899/">CVE-2017-6899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6967" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007149.html" source="SUSE-SU"/>
    <description>
    xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<bugzilla href="https://bugzilla.suse.com/1029912">SUSE bug 1029912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/442182">SUSE bug 442182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521959" comment="xrdp-0.9.0~git.1456906198.f422461-21.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105209">SUSE bug 1105209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7006" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct a timing side-channel attack to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses SVG filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7011" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to spoof the address bar via a crafted web site that uses FRAME elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7012" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the "WebKit Web Inspector" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7018" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7019" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit Page Loading" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7020" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7030" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7034" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7037" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7040" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7043" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7046" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7048" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7049" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7052" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7055" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7056" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7059" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the "WebKit" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7089" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7090" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive cookie information via a custom URL scheme.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7091" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7092" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7093" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7094" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7095" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7096" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7098" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7099" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7100" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7102" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7104" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7109" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via crafted web content that incorrectly interacts with the Application Cache policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7117" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7120" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. Safari before 11 is affected. The issue involves the "WebKit Storage" component. It allows attackers to bypass the Safari Private Browsing protection mechanism, and consequently obtain sensitive information about visited web sites.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7153" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to spoof user-interface information (about whether the entire content is derived from a valid TLS session) via a crafted web site that sends a 401 Unauthorized redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153</cve>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7156" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7157" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7160" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160</cve>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7161" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. Safari before 11.0.2 is affected. The issue involves the "WebKit Web Inspector" component. It allows remote attackers to execute arbitrary code via special characters that trigger command injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161</cve>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7165" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165</cve>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7184" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0866-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0867-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0877-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0881-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0885-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0886-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030575">SUSE bug 1030575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517233" comment="kernel-default-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517234" comment="kernel-default-devel-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517235" comment="kernel-default-extra-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517236" comment="kernel-devel-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517237" comment="kernel-macros-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517238" comment="kernel-source-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517239" comment="kernel-syms-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517240" comment="kernel-xen-3.12.69-60.64.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517241" comment="kernel-xen-devel-3.12.69-60.64.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518538" comment="kernel-default-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518539" comment="kernel-default-devel-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518540" comment="kernel-default-extra-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518541" comment="kernel-devel-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518542" comment="kernel-macros-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518543" comment="kernel-source-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518544" comment="kernel-syms-4.4.49-92.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517452" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517453" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7224" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7225" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7226" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105209">SUSE bug 1105209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7227" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7227" ref_url="https://www.suse.com/security/cve/CVE-2017-7227" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7227/">CVE-2017-7227</cve>
	<bugzilla href="https://bugzilla.suse.com/1030583">SUSE bug 1030583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518569" comment="xen-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518570" comment="xen-libs-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518571" comment="xen-libs-32bit-4.7.2_02-36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244</cve>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7245" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245</cve>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7246" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246</cve>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159629" comment="drm-kmp-default-4.9.33_k4.4.73_5-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7275" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7275" ref_url="https://www.suse.com/security/cve/CVE-2017-7275" source="SUSE CVE"/>
    <description>
    The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7275/">CVE-2017-7275</cve>
	<bugzilla href="https://bugzilla.suse.com/1031267">SUSE bug 1031267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7277" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7277" ref_url="https://www.suse.com/security/cve/CVE-2017-7277" source="SUSE CVE"/>
    <description>
    The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/socket.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7277/">CVE-2017-7277</cve>
	<bugzilla href="https://bugzilla.suse.com/1031265">SUSE bug 1031265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7286" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7286" ref_url="https://www.suse.com/security/cve/CVE-2017-7286" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7286/">CVE-2017-7286</cve>
	<bugzilla href="https://bugzilla.suse.com/1033458">SUSE bug 1033458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159629" comment="drm-kmp-default-4.9.33_k4.4.73_5-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7299" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7300" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7301" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7302" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7303" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7304" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7319" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7319" ref_url="https://www.suse.com/security/cve/CVE-2017-7319" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7319/">CVE-2017-7319</cve>
	<bugzilla href="https://bugzilla.suse.com/1033438">SUSE bug 1033438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7346" ref_url="https://www.suse.com/security/cve/CVE-2017-7346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The vmw_gb_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.7 does not validate certain levels data, which allows local users to cause a denial of service (system hang) via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7346/">CVE-2017-7346</cve>
	<bugzilla href="https://bugzilla.suse.com/1031796">SUSE bug 1031796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159629" comment="drm-kmp-default-4.9.33_k4.4.73_5-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7374" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7374" ref_url="https://www.suse.com/security/cve/CVE-2017-7374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7374/">CVE-2017-7374</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032006">SUSE bug 1032006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00040.html" source="SUSE-SU"/>
    <description>
    A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517672" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517673" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517674" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517675" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7376" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517672" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517673" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517674" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517675" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7377" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7377" ref_url="https://www.suse.com/security/cve/CVE-2017-7377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The (1) v9fs_create and (2) v9fs_lcreate functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS privileged users to cause a denial of service (file descriptor or memory consumption) via vectors related to an already in-use fid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7377/">CVE-2017-7377</cve>
	<bugzilla href="https://bugzilla.suse.com/1032075">SUSE bug 1032075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7378" ref_url="https://www.suse.com/security/cve/CVE-2017-7378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The PoDoFo::PdfPainter::ExpandTabs function in PdfPainter.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7378/">CVE-2017-7378</cve>
	<bugzilla href="https://bugzilla.suse.com/1032017">SUSE bug 1032017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7379" ref_url="https://www.suse.com/security/cve/CVE-2017-7379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The PoDoFo::PdfSimpleEncoding::ConvertToEncoding function in PdfEncoding.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7379/">CVE-2017-7379</cve>
	<bugzilla href="https://bugzilla.suse.com/1032018">SUSE bug 1032018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7380" ref_url="https://www.suse.com/security/cve/CVE-2017-7380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The doc/PdfPage.cpp:614:20 code in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7380/">CVE-2017-7380</cve>
	<bugzilla href="https://bugzilla.suse.com/1032019">SUSE bug 1032019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7381" ref_url="https://www.suse.com/security/cve/CVE-2017-7381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
    <description>
    The doc/PdfPage.cpp:609:23 code in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7381/">CVE-2017-7381</cve>
	<bugzilla href="https://bugzilla.suse.com/1032019">SUSE bug 1032019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032020">SUSE bug 1032020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7382" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7382" ref_url="https://www.suse.com/security/cve/CVE-2017-7382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
    <description>
    The PdfFontFactory.cpp:200:88 code in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7382/">CVE-2017-7382</cve>
	<bugzilla href="https://bugzilla.suse.com/1032019">SUSE bug 1032019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032021">SUSE bug 1032021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7383" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7383" ref_url="https://www.suse.com/security/cve/CVE-2017-7383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
    <description>
    The PdfFontFactory.cpp:195:62 code in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7383/">CVE-2017-7383</cve>
	<bugzilla href="https://bugzilla.suse.com/1032019">SUSE bug 1032019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032022">SUSE bug 1032022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7392" ref_url="https://www.suse.com/security/cve/CVE-2017-7392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SSecurityVeNCrypt.cxx SSecurityVeNCrypt::SSecurityVeNCrypt), an unauthenticated client can cause a small memory leak in the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7392/">CVE-2017-7392</cve>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517309" comment="tigervnc-1.4.3-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517310" comment="xorg-x11-Xvnc-1.4.3-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518604" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518605" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518606" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7393" ref_url="https://www.suse.com/security/cve/CVE-2017-7393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (VNCSConnectionST.cxx VNCSConnectionST::fence), an authenticated client can cause a double free, leading to denial of service or potentially code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7393/">CVE-2017-7393</cve>
	<bugzilla href="https://bugzilla.suse.com/1031875">SUSE bug 1031875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517309" comment="tigervnc-1.4.3-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517310" comment="xorg-x11-Xvnc-1.4.3-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518604" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518605" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518606" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7394" ref_url="https://www.suse.com/security/cve/CVE-2017-7394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SSecurityPlain.cxx SSecurityPlain::processMsg), unauthenticated users can crash the server by sending long usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7394/">CVE-2017-7394</cve>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517309" comment="tigervnc-1.4.3-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517310" comment="xorg-x11-Xvnc-1.4.3-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518604" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518605" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518606" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7395" ref_url="https://www.suse.com/security/cve/CVE-2017-7395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SMsgReader.cxx SMsgReader::readClientCutText), by causing an integer overflow, an authenticated client can crash the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7395/">CVE-2017-7395</cve>
	<bugzilla href="https://bugzilla.suse.com/1031877">SUSE bug 1031877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517309" comment="tigervnc-1.4.3-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517310" comment="xorg-x11-Xvnc-1.4.3-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518604" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518605" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518606" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7396" ref_url="https://www.suse.com/security/cve/CVE-2017-7396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (CConnection.cxx CConnection::CConnection), an unauthenticated client can cause a small memory leak in the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7396/">CVE-2017-7396</cve>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517309" comment="tigervnc-1.4.3-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517310" comment="xorg-x11-Xvnc-1.4.3-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518604" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518605" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518606" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1105-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00094.html" source="SUSE-SU"/>
    <description>
    The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517298" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517299" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517300" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00005.html" source="SUSE-SU"/>
    <description>
    In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435</cve>
	<bugzilla href="https://bugzilla.suse.com/1009127">SUSE bug 1009127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512570" comment="libzypp-16.19.0-2.36.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517971" comment="libzypp-16.15.2-27.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517972" comment="zypper-1.13.30-18.13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517973" comment="zypper-log-1.13.30-18.13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519248" comment="libzypp-16.15.3-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519249" comment="yast2-pkg-bindings-3.2.4-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00014.html" source="SUSE-SU"/>
    <description>
    In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<bugzilla href="https://bugzilla.suse.com/1008325">SUSE bug 1008325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009127">SUSE bug 1009127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512570" comment="libzypp-16.19.0-2.36.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512642" comment="zypper-1.13.45-21.23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512643" comment="zypper-log-1.13.45-21.23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517971" comment="libzypp-16.15.2-27.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517972" comment="zypper-1.13.30-18.13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517973" comment="zypper-log-1.13.30-18.13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519441" comment="libzypp-16.15.6-2.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519249" comment="yast2-pkg-bindings-3.2.4-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519442" comment="zypper-1.13.32-21.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519443" comment="zypper-log-1.13.32-21.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7467" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002832.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00069.html" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in the way minicom before version 2.7.1 handled VT100 escape sequences. A malicious terminal device could potentially use this flaw to crash minicom, or execute arbitrary code in the context of the minicom process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154609" comment="minicom-2.7-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517308" comment="minicom-2.7-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468" source="SUSE CVE"/>
    <description>
    In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468</cve>
	<bugzilla href="https://bugzilla.suse.com/1033413">SUSE bug 1033413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033442">SUSE bug 1033442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7471" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034990">SUSE bug 1034990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472</cve>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
    <description>
    Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157339" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157340" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157341" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157342" comment="libcairo2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157343" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009175342" comment="libcairo-gobject2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175343" comment="libcairo-gobject2-32bit-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175344" comment="libcairo-script-interpreter2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175345" comment="libcairo2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175346" comment="libcairo2-32bit-1.15.2-25.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517639" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517640" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517641" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517642" comment="libcairo2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517643" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7476" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476" source="SUSE CVE"/>
    <description>
    Gnulib before 2017-04-26 has a heap-based buffer overflow with the TZ environment variable. The error is in the save_abbr function in time_rz.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476</cve>
	<bugzilla href="https://bugzilla.suse.com/1036636">SUSE bug 1036636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037124">SUSE bug 1037124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037125">SUSE bug 1037125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037142">SUSE bug 1037142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333935" comment="coreutils is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334070" comment="emacs is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334071" comment="lftp is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7477" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7477" ref_url="https://www.suse.com/security/cve/CVE-2017-7477" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in drivers/net/macsec.c in the MACsec module in the Linux kernel through 4.10.12 allows attackers to cause a denial of service or possibly have unspecified other impact by leveraging the use of a MAX_SKB_FRAGS+1 size in conjunction with the NETIF_F_FRAGLIST feature, leading to an error in the skb_to_sgvec function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7477/">CVE-2017-7477</cve>
	<bugzilla href="https://bugzilla.suse.com/1035823">SUSE bug 1035823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00077.html" source="SUSE-SU"/>
    <description>
    OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518753" comment="openvpn-2.3.8-16.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00077.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518753" comment="openvpn-2.3.8-16.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1772-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html" source="SUSE-SU"/>
    <description>
    It was found that some selectivity estimation functions in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3 did not check user privileges before providing information from pg_statistic, possibly leaking information. An unprivileged attacker could use this flaw to steal some information from tables they are otherwise not allowed to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517654" comment="postgresql94-9.4.12-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1772-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html" source="SUSE-SU"/>
    <description>
    In PostgreSQL 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3, it was found that the PGREQUIRESSL environment variable was no longer enforcing a SSL/TLS connection to a PostgreSQL server. An active Man-in-the-Middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517654" comment="postgresql94-9.4.12-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1772-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517654" comment="postgresql94-9.4.12-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038883">SUSE bug 1038883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7493" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002918.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7017947" ref_url="https://www.suse.com/support/kb/doc/?id=7017947" source="SUSE-SU"/>
		<reference ref_id="TID7019508" ref_url="https://www.suse.com/support/kb/doc/?id=7019508" source="SUSE-SU"/>
		<reference ref_id="TID7021068" ref_url="https://www.suse.com/support/kb/doc/?id=7021068" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00072.html" source="SUSE-SU"/>
    <description>
    Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517399" comment="libdcerpc-binding0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517400" comment="libdcerpc-binding0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517401" comment="libdcerpc0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517402" comment="libdcerpc0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517403" comment="libgensec0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517404" comment="libgensec0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517405" comment="libndr-krb5pac0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517406" comment="libndr-krb5pac0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517407" comment="libndr-nbt0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517408" comment="libndr-nbt0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517409" comment="libndr-standard0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517410" comment="libndr-standard0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517411" comment="libndr0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517412" comment="libndr0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517413" comment="libnetapi0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517414" comment="libnetapi0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517415" comment="libregistry0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517416" comment="libsamba-credentials0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517417" comment="libsamba-credentials0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517418" comment="libsamba-hostconfig0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517419" comment="libsamba-hostconfig0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517420" comment="libsamba-passdb0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517421" comment="libsamba-passdb0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517422" comment="libsamba-util0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517423" comment="libsamba-util0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517424" comment="libsamdb0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517425" comment="libsamdb0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517426" comment="libsmbclient-raw0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517427" comment="libsmbclient-raw0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517428" comment="libsmbclient0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517429" comment="libsmbclient0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517430" comment="libsmbconf0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517431" comment="libsmbconf0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517432" comment="libsmbldap0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517433" comment="libsmbldap0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517434" comment="libtevent-util0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517435" comment="libtevent-util0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517436" comment="libwbclient0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517437" comment="libwbclient0-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517438" comment="samba-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517439" comment="samba-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517440" comment="samba-client-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517441" comment="samba-client-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517442" comment="samba-doc-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517443" comment="samba-libs-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517444" comment="samba-libs-32bit-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517445" comment="samba-winbind-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517446" comment="samba-winbind-32bit-4.2.4-28.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518682" comment="libdcerpc-atsvc0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518638" comment="libdcerpc-binding0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518639" comment="libdcerpc-binding0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518640" comment="libdcerpc0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518641" comment="libdcerpc0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518642" comment="libndr-krb5pac0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518643" comment="libndr-krb5pac0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518644" comment="libndr-nbt0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518645" comment="libndr-nbt0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518646" comment="libndr-standard0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518647" comment="libndr-standard0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518648" comment="libndr0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518649" comment="libndr0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518650" comment="libnetapi0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518651" comment="libnetapi0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518652" comment="libsamba-credentials0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518653" comment="libsamba-credentials0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518654" comment="libsamba-errors0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518655" comment="libsamba-errors0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518656" comment="libsamba-hostconfig0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518657" comment="libsamba-hostconfig0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518658" comment="libsamba-passdb0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518659" comment="libsamba-passdb0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518660" comment="libsamba-util0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518661" comment="libsamba-util0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518662" comment="libsamdb0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518663" comment="libsamdb0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518664" comment="libsmbclient0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518665" comment="libsmbclient0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518666" comment="libsmbconf0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518667" comment="libsmbconf0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518668" comment="libsmbldap0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518669" comment="libsmbldap0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518670" comment="libtevent-util0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518671" comment="libtevent-util0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518672" comment="libwbclient0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518673" comment="libwbclient0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518674" comment="samba-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518675" comment="samba-client-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518676" comment="samba-client-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518677" comment="samba-doc-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518678" comment="samba-libs-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518679" comment="samba-libs-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518680" comment="samba-winbind-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518681" comment="samba-winbind-32bit-4.4.2-38.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7495" ref_url="https://www.suse.com/security/cve/CVE-2017-7495" source="SUSE CVE"/>
    <description>
    fs/ext4/inode.c in the Linux kernel before 4.6.2, when ext4 data=ordered mode is used, mishandles a needs-flushing-before-commit list, which allows local users to obtain sensitive information from other users' files in opportunistic circumstances by waiting for a hardware reset, creating a new file, making write system calls, and reading this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7495/">CVE-2017-7495</cve>
	<bugzilla href="https://bugzilla.suse.com/1039010">SUSE bug 1039010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00058.html" source="SUSE-SU"/>
    <description>
    It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135195">SUSE bug 1135195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157882">SUSE bug 1157882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521784" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00058.html" source="SUSE-SU"/>
    <description>
    It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<bugzilla href="https://bugzilla.suse.com/1119217">SUSE bug 1119217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135195">SUSE bug 1135195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157882">SUSE bug 1157882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521784" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1836-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00084.html" source="SUSE-SU"/>
    <description>
    spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506</cve>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517898" comment="libspice-server1-0.12.7-10.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519463" comment="libspice-server1-0.12.8-3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7507" ref_url="https://www.suse.com/security/cve/CVE-2017-7507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00064.html" source="SUSE-SU"/>
    <description>
    GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7507/">CVE-2017-7507</cve>
	<bugzilla href="https://bugzilla.suse.com/1043398">SUSE bug 1043398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517893" comment="gnutls-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517894" comment="libgnutls28-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517895" comment="libgnutls28-32bit-3.2.15-18.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517609" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7511" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<bugzilla href="https://bugzilla.suse.com/1041783">SUSE bug 1041783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7515" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    poppler through version 0.55.0 is vulnerable to an uncontrolled recursion in pdfunite resulting into potential denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<bugzilla href="https://bugzilla.suse.com/1043088">SUSE bug 1043088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7516" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7516" ref_url="https://www.suse.com/security/cve/CVE-2017-7516" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2015-1197.  Reason: This candidate is a duplicate of CVE-2015-1197.  Notes: All CVE users should reference CVE-2015-1197 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7516/">CVE-2017-7516</cve>
	<bugzilla href="https://bugzilla.suse.com/1077990">SUSE bug 1077990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913677">SUSE bug 913677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338991" comment="cpio is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00010.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518</cve>
	<bugzilla href="https://bugzilla.suse.com/1045922">SUSE bug 1045922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517609" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517609" comment="openvpn-2.3.8-16.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1822-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00043.html" source="SUSE-SU"/>
    <description>
    libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047462">SUSE bug 1047462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512320" comment="libgcrypt20-1.6.1-16.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512321" comment="libgcrypt20-32bit-1.6.1-16.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517699" comment="libgcrypt20-1.6.1-16.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517700" comment="libgcrypt20-32bit-1.6.1-16.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050751">SUSE bug 1050751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517964" comment="kernel-default-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517965" comment="kernel-default-devel-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517966" comment="kernel-default-extra-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517967" comment="kernel-devel-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517968" comment="kernel-macros-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517969" comment="kernel-source-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517970" comment="kernel-syms-4.4.74-92.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00032.html" source="SUSE-SU"/>
    <description>
    The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<bugzilla href="https://bugzilla.suse.com/1049645">SUSE bug 1049645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00032.html" source="SUSE-SU"/>
    <description>
    The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7544" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518774" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518775" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to incorrect authentication flaw allowing remote attackers to gain access to database accounts with an empty password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518054" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518055" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518056" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518053" comment="postgresql94-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518057" comment="postgresql96-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518054" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518055" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518056" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518057" comment="postgresql96-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518054" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518055" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518056" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518053" comment="postgresql94-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518057" comment="postgresql96-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518054" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518055" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518056" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518057" comment="postgresql96-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions before 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers with no privileges on a large object to overwrite the entire contents of the object, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518054" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518055" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518056" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518053" comment="postgresql94-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518057" comment="postgresql96-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518054" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518055" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518056" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518057" comment="postgresql96-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7555" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    Augeas versions up to and including 1.8.0 are vulnerable to heap-based buffer overflow due to improper handling of escaped strings. Attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172798" comment="augeas-1.2.0-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172799" comment="augeas-lenses-1.2.0-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172800" comment="libaugeas0-1.2.0-17.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518995" comment="augeas-1.2.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518996" comment="augeas-lenses-1.2.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518997" comment="libaugeas0-1.2.0-12.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520526" comment="augeas-1.2.0-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520527" comment="augeas-lenses-1.2.0-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520528" comment="libaugeas0-1.2.0-17.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7585" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1107-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7586" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1107-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00096.html" source="SUSE-SU"/>
    <description>
    In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<bugzilla href="https://bugzilla.suse.com/1033053">SUSE bug 1033053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517296" comment="libsndfile1-1.0.25-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517297" comment="libsndfile1-32bit-1.0.25-28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The putagreytile function in tif_getimage.c in LibTIFF 4.0.7 has a left-shift undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<bugzilla href="https://bugzilla.suse.com/1033131">SUSE bug 1033131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The OJPEGReadHeaderInfoSecTablesDcTable function in tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (memory leak) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<bugzilla href="https://bugzilla.suse.com/1033128">SUSE bug 1033128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    tif_dirread.c in LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    tif_dirread.c in LibTIFF 4.0.7 might allow remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<bugzilla href="https://bugzilla.suse.com/1033118">SUSE bug 1033118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type short" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has a "shift exponent too large for 64-bit type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7606" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    coders/rle.c in ImageMagick 7.0.5-4 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7609" ref_url="https://www.suse.com/security/cve/CVE-2017-7609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7609/">CVE-2017-7609</cve>
	<bugzilla href="https://bugzilla.suse.com/1033086">SUSE bug 1033086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7614" ref_url="https://www.suse.com/security/cve/CVE-2017-7614" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a "member access within null pointer" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an "int main() {return 0;}" program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7614/">CVE-2017-7614</cve>
	<bugzilla href="https://bugzilla.suse.com/1033122">SUSE bug 1033122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105209">SUSE bug 1105209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7618" ref_url="https://www.suse.com/security/cve/CVE-2017-7618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7618/">CVE-2017-7618</cve>
	<bugzilla href="https://bugzilla.suse.com/1033340">SUSE bug 1033340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7619" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7619" ref_url="https://www.suse.com/security/cve/CVE-2017-7619" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.4-9, an infinite loop can occur because of a floating-point rounding error in some of the color algorithms. This affects ModulateHSL, ModulateHCL, ModulateHCLp, ModulateHSB, ModulateHSI, ModulateHSV, ModulateHWB, ModulateLCHab, and ModulateLCHuv.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7619/">CVE-2017-7619</cve>
	<bugzilla href="https://bugzilla.suse.com/1033361">SUSE bug 1033361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7645" ref_url="https://www.suse.com/security/cve/CVE-2017-7645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7645/">CVE-2017-7645</cve>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036741">SUSE bug 1036741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046191">SUSE bug 1046191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7700" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7701" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7702" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7703" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7704" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7705" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7718" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517318" comment="xen-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517319" comment="xen-kmp-default-4.5.5_10_k3.12.69_60.64.35-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517320" comment="xen-libs-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517321" comment="xen-libs-32bit-4.5.5_10-22.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518607" comment="xen-4.7.2_04-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518608" comment="xen-libs-4.7.2_04-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518609" comment="xen-libs-32bit-4.7.2_04-39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7741" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1107-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1107-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7745" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7747" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7748" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during video control operations when a "&lt;track&gt;" element holds a reference to an older window if that window has been replaced in the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during specific user interactions with the input method editor (IME) in some languages due to how events are handled. This results in a potentially exploitable crash but would require specific user interaction to trigger. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in WebGL with a maliciously crafted "ImageInfo" object during WebGL operations. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7755" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The Firefox installer on Windows can be made to load malicious DLL files stored in the same directory as the installer when it is run. This allows privileged execution if the installer is run with elevated privileges. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7761" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service "helper.exe" application creates a temporary directory writable by non-privileged users. When this is combined with creation of a junction (a form of symbolic link), protected files in the target directory of the junction can be deleted by the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 52.2 and Firefox &lt; 54.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7763" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
    <description>
    Default fonts on OS X display some Tibetan characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7765" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The "Mark of the Web" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the Internet is not shown. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7768" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service can be invoked by an unprivileged user to read 32 bytes of any arbitrary file on the local system by convincing the service that it is reading a status file provided by the Mozilla Windows Updater. The Mozilla Maintenance Service executes with privileged access, bypassing system protections against unprivileged users. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 52.2 and Firefox &lt; 54.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7782" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    An error in the "WindowsDllDetourPatcher" where a RWX ("Read/Write/Execute") 4k block is allocated but never protected, violating DEP protections. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7789" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If a server sends two Strict-Transport-Security (STS) headers for a single connection, they will be rejected as invalid and HTTP Strict Transport Security (HSTS) will not be enabled for the connection. This vulnerability affects Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789</cve>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR &lt; 52.3 and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while re-computing layout for a "marquee" element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    When a page's content security policy (CSP) header contains a "sandbox" directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7804" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    The destructor function for the "WindowsDllDetourPatcher" class can be re-purposed by malicious code in concert with another vulnerability to write arbitrary data to an attacker controlled location in memory. This can be used to bypass existing memory protections in this situation. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7825" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Several fonts on OS X display some Tibetan and Arabic characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3110-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00087.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518381" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518382" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3110-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00087.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when flushing and resizing layout because the "PressShell" object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518381" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518382" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3110-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00087.html" source="SUSE-SU"/>
    <description>
    The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518381" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518382" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7844" ref_url="https://www.suse.com/security/cve/CVE-2017-7844" source="SUSE CVE"/>
    <description>
    A combination of an external SVG image referenced on a page and the coloring of anchor links stored within this image can be used to determine which pages a user has in their history. This can allow a malicious website to query user history. Note: This issue only affects Firefox 57. Earlier releases are not affected. This vulnerability affects Firefox &lt; 57.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7844/">CVE-2017-7844</cve>
	<bugzilla href="https://bugzilla.suse.com/1072034">SUSE bug 1072034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072036">SUSE bug 1072036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7845" ref_url="https://www.suse.com/security/cve/CVE-2017-7845" source="SUSE CVE"/>
    <description>
    A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Thunderbird &lt; 52.5.2, Firefox ESR &lt; 52.5.2, and Firefox &lt; 57.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-7845/">CVE-2017-7845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7853" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7853" ref_url="https://www.suse.com/security/cve/CVE-2017-7853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002849.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00033.html" source="SUSE-SU"/>
    <description>
    In libosip2 in GNU oSIP 4.1.0 and 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7853/">CVE-2017-7853</cve>
	<bugzilla href="https://bugzilla.suse.com/1034570">SUSE bug 1034570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155050" comment="libosip2-3.5.0-20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517334" comment="libosip2-3.5.0-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7856" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7856" ref_url="https://www.suse.com/security/cve/CVE-2017-7856" source="SUSE CVE"/>
    <description>
    LibreOffice before 2017-03-11 has an out-of-bounds write caused by a heap-based buffer overflow in the SVMConverter::ImplConvertFromSVM1 function in vcl/source/gdi/svmconverter.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7856/">CVE-2017-7856</cve>
	<bugzilla href="https://bugzilla.suse.com/1034193">SUSE bug 1034193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333957" comment="libreoffice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7857" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7857" ref_url="https://www.suse.com/security/cve/CVE-2017-7857" source="SUSE CVE"/>
    <description>
    FreeType 2 before 2017-03-08 has an out-of-bounds write caused by a heap-based buffer overflow related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7857/">CVE-2017-7857</cve>
	<bugzilla href="https://bugzilla.suse.com/1034189">SUSE bug 1034189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7858" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7858" ref_url="https://www.suse.com/security/cve/CVE-2017-7858" source="SUSE CVE"/>
    <description>
    FreeType 2 before 2017-03-07 has an out-of-bounds write related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7858/">CVE-2017-7858</cve>
	<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7864" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7864" ref_url="https://www.suse.com/security/cve/CVE-2017-7864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00016.html" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2017-02-02 has an out-of-bounds write caused by a heap-based buffer overflow related to the tt_size_reset function in truetype/ttobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7864/">CVE-2017-7864</cve>
	<bugzilla href="https://bugzilla.suse.com/1034178">SUSE bug 1034178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518890" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518891" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518892" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7867" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7868" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00064.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149679">SUSE bug 1149679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517893" comment="gnutls-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517894" comment="libgnutls28-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517895" comment="libgnutls28-32bit-3.2.15-18.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7870" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7870" ref_url="https://www.suse.com/security/cve/CVE-2017-7870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003174.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1851-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00065.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 2017-01-02 has an out-of-bounds write caused by a heap-based buffer overflow related to the tools::Polygon::Insert function in tools/source/generic/poly.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7870/">CVE-2017-7870</cve>
	<bugzilla href="https://bugzilla.suse.com/1034568">SUSE bug 1034568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517712" comment="libixion-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517713" comment="libmwaw-0_3-3-0.3.11-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517714" comment="liborcus-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517715" comment="libreoffice-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517716" comment="libreoffice-base-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517717" comment="libreoffice-base-drivers-mysql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517718" comment="libreoffice-base-drivers-postgresql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517719" comment="libreoffice-calc-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517720" comment="libreoffice-calc-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517721" comment="libreoffice-draw-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517722" comment="libreoffice-filters-optional-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517723" comment="libreoffice-gnome-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517724" comment="libreoffice-icon-theme-galaxy-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517725" comment="libreoffice-icon-theme-tango-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517726" comment="libreoffice-impress-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517727" comment="libreoffice-l10n-af-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517728" comment="libreoffice-l10n-ar-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517729" comment="libreoffice-l10n-ca-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517730" comment="libreoffice-l10n-cs-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517731" comment="libreoffice-l10n-da-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517732" comment="libreoffice-l10n-de-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517733" comment="libreoffice-l10n-en-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517734" comment="libreoffice-l10n-es-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517735" comment="libreoffice-l10n-fi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517736" comment="libreoffice-l10n-fr-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517737" comment="libreoffice-l10n-gu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517738" comment="libreoffice-l10n-hi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517739" comment="libreoffice-l10n-hu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517740" comment="libreoffice-l10n-it-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517741" comment="libreoffice-l10n-ja-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517742" comment="libreoffice-l10n-ko-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517743" comment="libreoffice-l10n-nb-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517744" comment="libreoffice-l10n-nl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517745" comment="libreoffice-l10n-nn-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517746" comment="libreoffice-l10n-pl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517747" comment="libreoffice-l10n-pt_BR-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517748" comment="libreoffice-l10n-pt_PT-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517749" comment="libreoffice-l10n-ro-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517750" comment="libreoffice-l10n-ru-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517751" comment="libreoffice-l10n-sk-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517752" comment="libreoffice-l10n-sv-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517753" comment="libreoffice-l10n-xh-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517754" comment="libreoffice-l10n-zh_CN-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517755" comment="libreoffice-l10n-zh_TW-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517756" comment="libreoffice-l10n-zu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517757" comment="libreoffice-mailmerge-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517758" comment="libreoffice-math-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517759" comment="libreoffice-officebean-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517760" comment="libreoffice-pyuno-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517761" comment="libreoffice-writer-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517762" comment="libreoffice-writer-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517763" comment="libreofficekit-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517764" comment="libstaroffice-0_0-0-0.0.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517765" comment="libzmf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517766" comment="myspell-af_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517767" comment="myspell-af_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517768" comment="myspell-ar-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517769" comment="myspell-ar_AE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517770" comment="myspell-ar_BH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517771" comment="myspell-ar_DZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517772" comment="myspell-ar_EG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517773" comment="myspell-ar_IQ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517774" comment="myspell-ar_JO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517775" comment="myspell-ar_KW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517776" comment="myspell-ar_LB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517777" comment="myspell-ar_LY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517778" comment="myspell-ar_MA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517779" comment="myspell-ar_OM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517780" comment="myspell-ar_QA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517781" comment="myspell-ar_SA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517782" comment="myspell-ar_SD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517783" comment="myspell-ar_SY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517784" comment="myspell-ar_TN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517785" comment="myspell-ar_YE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517786" comment="myspell-be_BY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517787" comment="myspell-bg_BG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517788" comment="myspell-bn_BD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517789" comment="myspell-bn_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517790" comment="myspell-bs-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517791" comment="myspell-bs_BA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517792" comment="myspell-ca-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517793" comment="myspell-ca_AD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517794" comment="myspell-ca_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517795" comment="myspell-ca_ES_valencia-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517796" comment="myspell-ca_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517797" comment="myspell-ca_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517798" comment="myspell-cs_CZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517799" comment="myspell-da_DK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517800" comment="myspell-de-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517801" comment="myspell-de_AT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517802" comment="myspell-de_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517803" comment="myspell-de_DE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517804" comment="myspell-dictionaries-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517805" comment="myspell-el_GR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517806" comment="myspell-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517807" comment="myspell-en_AU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517808" comment="myspell-en_BS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517809" comment="myspell-en_BZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517810" comment="myspell-en_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517811" comment="myspell-en_GB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517812" comment="myspell-en_GH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517813" comment="myspell-en_IE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517814" comment="myspell-en_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517815" comment="myspell-en_JM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517816" comment="myspell-en_MW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517817" comment="myspell-en_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517818" comment="myspell-en_NZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517819" comment="myspell-en_PH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517820" comment="myspell-en_TT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517821" comment="myspell-en_US-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517822" comment="myspell-en_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517823" comment="myspell-en_ZW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517824" comment="myspell-es-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517825" comment="myspell-es_AR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517826" comment="myspell-es_BO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517827" comment="myspell-es_CL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517828" comment="myspell-es_CO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517829" comment="myspell-es_CR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517830" comment="myspell-es_CU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517831" comment="myspell-es_DO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517832" comment="myspell-es_EC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517833" comment="myspell-es_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517834" comment="myspell-es_GT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517835" comment="myspell-es_HN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517836" comment="myspell-es_MX-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517837" comment="myspell-es_NI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517838" comment="myspell-es_PA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517839" comment="myspell-es_PE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517840" comment="myspell-es_PR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517841" comment="myspell-es_PY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517842" comment="myspell-es_SV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517843" comment="myspell-es_UY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517844" comment="myspell-es_VE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517845" comment="myspell-et_EE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517846" comment="myspell-fr_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517847" comment="myspell-fr_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517848" comment="myspell-fr_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517849" comment="myspell-fr_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517850" comment="myspell-fr_LU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517851" comment="myspell-fr_MC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517852" comment="myspell-gu_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517853" comment="myspell-he_IL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517854" comment="myspell-hi_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517855" comment="myspell-hr_HR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517856" comment="myspell-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517857" comment="myspell-it_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517858" comment="myspell-lightproof-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517859" comment="myspell-lightproof-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517860" comment="myspell-lightproof-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517861" comment="myspell-lightproof-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517862" comment="myspell-lo_LA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517863" comment="myspell-lt_LT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517864" comment="myspell-lv_LV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517865" comment="myspell-nb_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517866" comment="myspell-nl_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517867" comment="myspell-nl_NL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517868" comment="myspell-nn_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517869" comment="myspell-no-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517870" comment="myspell-pl_PL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517871" comment="myspell-pt_AO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517872" comment="myspell-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517873" comment="myspell-pt_PT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517874" comment="myspell-ro-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517875" comment="myspell-ro_RO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517876" comment="myspell-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517877" comment="myspell-sk_SK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517878" comment="myspell-sl_SI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517879" comment="myspell-sr-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517880" comment="myspell-sr_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517881" comment="myspell-sr_Latn_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517882" comment="myspell-sr_Latn_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517883" comment="myspell-sr_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517884" comment="myspell-sv_FI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517885" comment="myspell-sv_SE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517886" comment="myspell-te-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517887" comment="myspell-te_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517888" comment="myspell-th_TH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517889" comment="myspell-uk_UA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517890" comment="myspell-vi-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517891" comment="myspell-vi_VN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517892" comment="myspell-zu_ZA-20170511-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519257" comment="libixion-0_12-0-0.12.1-13.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519258" comment="libmwaw-0_3-3-0.3.11-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519259" comment="liborcus-0_12-0-0.12.1-10.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519260" comment="libreoffice-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519261" comment="libreoffice-base-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519262" comment="libreoffice-base-drivers-mysql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519263" comment="libreoffice-base-drivers-postgresql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519264" comment="libreoffice-calc-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519265" comment="libreoffice-calc-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519266" comment="libreoffice-draw-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519267" comment="libreoffice-filters-optional-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519268" comment="libreoffice-gnome-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519269" comment="libreoffice-icon-theme-galaxy-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519270" comment="libreoffice-icon-theme-tango-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519271" comment="libreoffice-impress-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519272" comment="libreoffice-l10n-af-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519273" comment="libreoffice-l10n-ar-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519274" comment="libreoffice-l10n-ca-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519275" comment="libreoffice-l10n-cs-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519276" comment="libreoffice-l10n-da-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519277" comment="libreoffice-l10n-de-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519278" comment="libreoffice-l10n-en-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519279" comment="libreoffice-l10n-es-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519280" comment="libreoffice-l10n-fi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519281" comment="libreoffice-l10n-fr-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519282" comment="libreoffice-l10n-gu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519283" comment="libreoffice-l10n-hi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519284" comment="libreoffice-l10n-hu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519285" comment="libreoffice-l10n-it-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519286" comment="libreoffice-l10n-ja-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519287" comment="libreoffice-l10n-ko-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519288" comment="libreoffice-l10n-nb-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519289" comment="libreoffice-l10n-nl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519290" comment="libreoffice-l10n-nn-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519291" comment="libreoffice-l10n-pl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519292" comment="libreoffice-l10n-pt_BR-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519293" comment="libreoffice-l10n-pt_PT-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519294" comment="libreoffice-l10n-ro-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519295" comment="libreoffice-l10n-ru-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519296" comment="libreoffice-l10n-sk-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519297" comment="libreoffice-l10n-sv-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519298" comment="libreoffice-l10n-xh-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519299" comment="libreoffice-l10n-zh_CN-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519300" comment="libreoffice-l10n-zh_TW-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519301" comment="libreoffice-l10n-zu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519302" comment="libreoffice-mailmerge-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519303" comment="libreoffice-math-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519304" comment="libreoffice-officebean-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519305" comment="libreoffice-pyuno-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519306" comment="libreoffice-writer-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519307" comment="libreoffice-writer-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519308" comment="libreofficekit-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519309" comment="libstaroffice-0_0-0-0.0.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519310" comment="libzmf-0_0-0-0.0.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519311" comment="myspell-af_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519312" comment="myspell-af_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519313" comment="myspell-ar-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519314" comment="myspell-ar_AE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519315" comment="myspell-ar_BH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519316" comment="myspell-ar_DZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519317" comment="myspell-ar_EG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519318" comment="myspell-ar_IQ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519319" comment="myspell-ar_JO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519320" comment="myspell-ar_KW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519321" comment="myspell-ar_LB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519322" comment="myspell-ar_LY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519323" comment="myspell-ar_MA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519324" comment="myspell-ar_OM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519325" comment="myspell-ar_QA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519326" comment="myspell-ar_SA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519327" comment="myspell-ar_SD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519328" comment="myspell-ar_SY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519329" comment="myspell-ar_TN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519330" comment="myspell-ar_YE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519331" comment="myspell-be_BY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519332" comment="myspell-bg_BG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519333" comment="myspell-bn_BD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519334" comment="myspell-bn_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519335" comment="myspell-bs-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519336" comment="myspell-bs_BA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519337" comment="myspell-ca-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519338" comment="myspell-ca_AD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519339" comment="myspell-ca_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519340" comment="myspell-ca_ES_valencia-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519341" comment="myspell-ca_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519342" comment="myspell-ca_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519343" comment="myspell-cs_CZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519344" comment="myspell-da_DK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519345" comment="myspell-de-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519346" comment="myspell-de_AT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519347" comment="myspell-de_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519348" comment="myspell-de_DE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519349" comment="myspell-dictionaries-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519350" comment="myspell-el_GR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519351" comment="myspell-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519352" comment="myspell-en_AU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519353" comment="myspell-en_BS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519354" comment="myspell-en_BZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519355" comment="myspell-en_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519356" comment="myspell-en_GB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519357" comment="myspell-en_GH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519358" comment="myspell-en_IE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519359" comment="myspell-en_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519360" comment="myspell-en_JM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519361" comment="myspell-en_MW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519362" comment="myspell-en_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519363" comment="myspell-en_NZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519364" comment="myspell-en_PH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519365" comment="myspell-en_TT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519366" comment="myspell-en_US-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519367" comment="myspell-en_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519368" comment="myspell-en_ZW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519369" comment="myspell-es-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519370" comment="myspell-es_AR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519371" comment="myspell-es_BO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519372" comment="myspell-es_CL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519373" comment="myspell-es_CO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519374" comment="myspell-es_CR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519375" comment="myspell-es_CU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519376" comment="myspell-es_DO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519377" comment="myspell-es_EC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519378" comment="myspell-es_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519379" comment="myspell-es_GT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519380" comment="myspell-es_HN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519381" comment="myspell-es_MX-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519382" comment="myspell-es_NI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519383" comment="myspell-es_PA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519384" comment="myspell-es_PE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519385" comment="myspell-es_PR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519386" comment="myspell-es_PY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519387" comment="myspell-es_SV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519388" comment="myspell-es_UY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519389" comment="myspell-es_VE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519390" comment="myspell-et_EE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519391" comment="myspell-fr_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519392" comment="myspell-fr_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519393" comment="myspell-fr_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519394" comment="myspell-fr_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519395" comment="myspell-fr_LU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519396" comment="myspell-fr_MC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519397" comment="myspell-gu_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519398" comment="myspell-he_IL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519399" comment="myspell-hi_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519400" comment="myspell-hr_HR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519401" comment="myspell-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519402" comment="myspell-it_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519403" comment="myspell-lightproof-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519404" comment="myspell-lightproof-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519405" comment="myspell-lightproof-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519406" comment="myspell-lightproof-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519407" comment="myspell-lo_LA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519408" comment="myspell-lt_LT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519409" comment="myspell-lv_LV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519410" comment="myspell-nb_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519411" comment="myspell-nl_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519412" comment="myspell-nl_NL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519413" comment="myspell-nn_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519414" comment="myspell-no-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519415" comment="myspell-pl_PL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519416" comment="myspell-pt_AO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519417" comment="myspell-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519418" comment="myspell-pt_PT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519419" comment="myspell-ro-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519420" comment="myspell-ro_RO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519421" comment="myspell-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519422" comment="myspell-sk_SK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519423" comment="myspell-sl_SI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519424" comment="myspell-sr-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519425" comment="myspell-sr_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519426" comment="myspell-sr_Latn_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519427" comment="myspell-sr_Latn_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519428" comment="myspell-sr_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519429" comment="myspell-sv_FI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519430" comment="myspell-sv_SE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519431" comment="myspell-te-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519432" comment="myspell-te_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519433" comment="myspell-th_TH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519434" comment="myspell-uk_UA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519435" comment="myspell-vi-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519436" comment="myspell-vi_VN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519437" comment="myspell-zu_ZA-20170511-16.2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7874" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7874" ref_url="https://www.suse.com/security/cve/CVE-2017-7874" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-15"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7874/">CVE-2017-7874</cve>
	<bugzilla href="https://bugzilla.suse.com/1034330">SUSE bug 1034330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493158">SUSE bug 493158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7882" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7882" ref_url="https://www.suse.com/security/cve/CVE-2017-7882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003174.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1851-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00065.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 2017-03-14 has an out-of-bounds write related to the HWPFile::TagsRead function in hwpfilter/source/hwpfile.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7882/">CVE-2017-7882</cve>
	<bugzilla href="https://bugzilla.suse.com/1034329">SUSE bug 1034329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517712" comment="libixion-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517713" comment="libmwaw-0_3-3-0.3.11-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517714" comment="liborcus-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517715" comment="libreoffice-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517716" comment="libreoffice-base-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517717" comment="libreoffice-base-drivers-mysql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517718" comment="libreoffice-base-drivers-postgresql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517719" comment="libreoffice-calc-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517720" comment="libreoffice-calc-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517721" comment="libreoffice-draw-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517722" comment="libreoffice-filters-optional-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517723" comment="libreoffice-gnome-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517724" comment="libreoffice-icon-theme-galaxy-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517725" comment="libreoffice-icon-theme-tango-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517726" comment="libreoffice-impress-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517727" comment="libreoffice-l10n-af-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517728" comment="libreoffice-l10n-ar-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517729" comment="libreoffice-l10n-ca-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517730" comment="libreoffice-l10n-cs-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517731" comment="libreoffice-l10n-da-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517732" comment="libreoffice-l10n-de-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517733" comment="libreoffice-l10n-en-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517734" comment="libreoffice-l10n-es-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517735" comment="libreoffice-l10n-fi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517736" comment="libreoffice-l10n-fr-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517737" comment="libreoffice-l10n-gu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517738" comment="libreoffice-l10n-hi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517739" comment="libreoffice-l10n-hu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517740" comment="libreoffice-l10n-it-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517741" comment="libreoffice-l10n-ja-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517742" comment="libreoffice-l10n-ko-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517743" comment="libreoffice-l10n-nb-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517744" comment="libreoffice-l10n-nl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517745" comment="libreoffice-l10n-nn-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517746" comment="libreoffice-l10n-pl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517747" comment="libreoffice-l10n-pt_BR-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517748" comment="libreoffice-l10n-pt_PT-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517749" comment="libreoffice-l10n-ro-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517750" comment="libreoffice-l10n-ru-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517751" comment="libreoffice-l10n-sk-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517752" comment="libreoffice-l10n-sv-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517753" comment="libreoffice-l10n-xh-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517754" comment="libreoffice-l10n-zh_CN-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517755" comment="libreoffice-l10n-zh_TW-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517756" comment="libreoffice-l10n-zu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517757" comment="libreoffice-mailmerge-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517758" comment="libreoffice-math-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517759" comment="libreoffice-officebean-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517760" comment="libreoffice-pyuno-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517761" comment="libreoffice-writer-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517762" comment="libreoffice-writer-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517763" comment="libreofficekit-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517764" comment="libstaroffice-0_0-0-0.0.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517765" comment="libzmf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517766" comment="myspell-af_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517767" comment="myspell-af_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517768" comment="myspell-ar-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517769" comment="myspell-ar_AE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517770" comment="myspell-ar_BH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517771" comment="myspell-ar_DZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517772" comment="myspell-ar_EG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517773" comment="myspell-ar_IQ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517774" comment="myspell-ar_JO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517775" comment="myspell-ar_KW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517776" comment="myspell-ar_LB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517777" comment="myspell-ar_LY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517778" comment="myspell-ar_MA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517779" comment="myspell-ar_OM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517780" comment="myspell-ar_QA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517781" comment="myspell-ar_SA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517782" comment="myspell-ar_SD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517783" comment="myspell-ar_SY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517784" comment="myspell-ar_TN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517785" comment="myspell-ar_YE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517786" comment="myspell-be_BY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517787" comment="myspell-bg_BG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517788" comment="myspell-bn_BD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517789" comment="myspell-bn_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517790" comment="myspell-bs-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517791" comment="myspell-bs_BA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517792" comment="myspell-ca-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517793" comment="myspell-ca_AD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517794" comment="myspell-ca_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517795" comment="myspell-ca_ES_valencia-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517796" comment="myspell-ca_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517797" comment="myspell-ca_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517798" comment="myspell-cs_CZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517799" comment="myspell-da_DK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517800" comment="myspell-de-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517801" comment="myspell-de_AT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517802" comment="myspell-de_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517803" comment="myspell-de_DE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517804" comment="myspell-dictionaries-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517805" comment="myspell-el_GR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517806" comment="myspell-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517807" comment="myspell-en_AU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517808" comment="myspell-en_BS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517809" comment="myspell-en_BZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517810" comment="myspell-en_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517811" comment="myspell-en_GB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517812" comment="myspell-en_GH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517813" comment="myspell-en_IE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517814" comment="myspell-en_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517815" comment="myspell-en_JM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517816" comment="myspell-en_MW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517817" comment="myspell-en_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517818" comment="myspell-en_NZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517819" comment="myspell-en_PH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517820" comment="myspell-en_TT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517821" comment="myspell-en_US-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517822" comment="myspell-en_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517823" comment="myspell-en_ZW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517824" comment="myspell-es-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517825" comment="myspell-es_AR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517826" comment="myspell-es_BO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517827" comment="myspell-es_CL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517828" comment="myspell-es_CO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517829" comment="myspell-es_CR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517830" comment="myspell-es_CU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517831" comment="myspell-es_DO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517832" comment="myspell-es_EC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517833" comment="myspell-es_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517834" comment="myspell-es_GT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517835" comment="myspell-es_HN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517836" comment="myspell-es_MX-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517837" comment="myspell-es_NI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517838" comment="myspell-es_PA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517839" comment="myspell-es_PE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517840" comment="myspell-es_PR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517841" comment="myspell-es_PY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517842" comment="myspell-es_SV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517843" comment="myspell-es_UY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517844" comment="myspell-es_VE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517845" comment="myspell-et_EE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517846" comment="myspell-fr_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517847" comment="myspell-fr_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517848" comment="myspell-fr_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517849" comment="myspell-fr_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517850" comment="myspell-fr_LU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517851" comment="myspell-fr_MC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517852" comment="myspell-gu_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517853" comment="myspell-he_IL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517854" comment="myspell-hi_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517855" comment="myspell-hr_HR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517856" comment="myspell-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517857" comment="myspell-it_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517858" comment="myspell-lightproof-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517859" comment="myspell-lightproof-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517860" comment="myspell-lightproof-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517861" comment="myspell-lightproof-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517862" comment="myspell-lo_LA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517863" comment="myspell-lt_LT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517864" comment="myspell-lv_LV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517865" comment="myspell-nb_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517866" comment="myspell-nl_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517867" comment="myspell-nl_NL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517868" comment="myspell-nn_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517869" comment="myspell-no-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517870" comment="myspell-pl_PL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517871" comment="myspell-pt_AO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517872" comment="myspell-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517873" comment="myspell-pt_PT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517874" comment="myspell-ro-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517875" comment="myspell-ro_RO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517876" comment="myspell-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517877" comment="myspell-sk_SK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517878" comment="myspell-sl_SI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517879" comment="myspell-sr-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517880" comment="myspell-sr_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517881" comment="myspell-sr_Latn_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517882" comment="myspell-sr_Latn_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517883" comment="myspell-sr_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517884" comment="myspell-sv_FI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517885" comment="myspell-sv_SE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517886" comment="myspell-te-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517887" comment="myspell-te_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517888" comment="myspell-th_TH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517889" comment="myspell-uk_UA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517890" comment="myspell-vi-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517891" comment="myspell-vi_VN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517892" comment="myspell-zu_ZA-20170511-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519257" comment="libixion-0_12-0-0.12.1-13.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519258" comment="libmwaw-0_3-3-0.3.11-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519259" comment="liborcus-0_12-0-0.12.1-10.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519260" comment="libreoffice-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519261" comment="libreoffice-base-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519262" comment="libreoffice-base-drivers-mysql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519263" comment="libreoffice-base-drivers-postgresql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519264" comment="libreoffice-calc-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519265" comment="libreoffice-calc-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519266" comment="libreoffice-draw-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519267" comment="libreoffice-filters-optional-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519268" comment="libreoffice-gnome-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519269" comment="libreoffice-icon-theme-galaxy-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519270" comment="libreoffice-icon-theme-tango-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519271" comment="libreoffice-impress-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519272" comment="libreoffice-l10n-af-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519273" comment="libreoffice-l10n-ar-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519274" comment="libreoffice-l10n-ca-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519275" comment="libreoffice-l10n-cs-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519276" comment="libreoffice-l10n-da-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519277" comment="libreoffice-l10n-de-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519278" comment="libreoffice-l10n-en-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519279" comment="libreoffice-l10n-es-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519280" comment="libreoffice-l10n-fi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519281" comment="libreoffice-l10n-fr-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519282" comment="libreoffice-l10n-gu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519283" comment="libreoffice-l10n-hi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519284" comment="libreoffice-l10n-hu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519285" comment="libreoffice-l10n-it-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519286" comment="libreoffice-l10n-ja-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519287" comment="libreoffice-l10n-ko-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519288" comment="libreoffice-l10n-nb-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519289" comment="libreoffice-l10n-nl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519290" comment="libreoffice-l10n-nn-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519291" comment="libreoffice-l10n-pl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519292" comment="libreoffice-l10n-pt_BR-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519293" comment="libreoffice-l10n-pt_PT-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519294" comment="libreoffice-l10n-ro-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519295" comment="libreoffice-l10n-ru-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519296" comment="libreoffice-l10n-sk-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519297" comment="libreoffice-l10n-sv-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519298" comment="libreoffice-l10n-xh-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519299" comment="libreoffice-l10n-zh_CN-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519300" comment="libreoffice-l10n-zh_TW-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519301" comment="libreoffice-l10n-zu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519302" comment="libreoffice-mailmerge-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519303" comment="libreoffice-math-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519304" comment="libreoffice-officebean-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519305" comment="libreoffice-pyuno-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519306" comment="libreoffice-writer-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519307" comment="libreoffice-writer-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519308" comment="libreofficekit-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519309" comment="libstaroffice-0_0-0-0.0.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519310" comment="libzmf-0_0-0-0.0.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519311" comment="myspell-af_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519312" comment="myspell-af_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519313" comment="myspell-ar-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519314" comment="myspell-ar_AE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519315" comment="myspell-ar_BH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519316" comment="myspell-ar_DZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519317" comment="myspell-ar_EG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519318" comment="myspell-ar_IQ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519319" comment="myspell-ar_JO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519320" comment="myspell-ar_KW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519321" comment="myspell-ar_LB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519322" comment="myspell-ar_LY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519323" comment="myspell-ar_MA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519324" comment="myspell-ar_OM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519325" comment="myspell-ar_QA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519326" comment="myspell-ar_SA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519327" comment="myspell-ar_SD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519328" comment="myspell-ar_SY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519329" comment="myspell-ar_TN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519330" comment="myspell-ar_YE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519331" comment="myspell-be_BY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519332" comment="myspell-bg_BG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519333" comment="myspell-bn_BD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519334" comment="myspell-bn_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519335" comment="myspell-bs-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519336" comment="myspell-bs_BA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519337" comment="myspell-ca-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519338" comment="myspell-ca_AD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519339" comment="myspell-ca_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519340" comment="myspell-ca_ES_valencia-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519341" comment="myspell-ca_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519342" comment="myspell-ca_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519343" comment="myspell-cs_CZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519344" comment="myspell-da_DK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519345" comment="myspell-de-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519346" comment="myspell-de_AT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519347" comment="myspell-de_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519348" comment="myspell-de_DE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519349" comment="myspell-dictionaries-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519350" comment="myspell-el_GR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519351" comment="myspell-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519352" comment="myspell-en_AU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519353" comment="myspell-en_BS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519354" comment="myspell-en_BZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519355" comment="myspell-en_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519356" comment="myspell-en_GB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519357" comment="myspell-en_GH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519358" comment="myspell-en_IE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519359" comment="myspell-en_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519360" comment="myspell-en_JM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519361" comment="myspell-en_MW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519362" comment="myspell-en_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519363" comment="myspell-en_NZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519364" comment="myspell-en_PH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519365" comment="myspell-en_TT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519366" comment="myspell-en_US-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519367" comment="myspell-en_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519368" comment="myspell-en_ZW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519369" comment="myspell-es-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519370" comment="myspell-es_AR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519371" comment="myspell-es_BO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519372" comment="myspell-es_CL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519373" comment="myspell-es_CO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519374" comment="myspell-es_CR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519375" comment="myspell-es_CU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519376" comment="myspell-es_DO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519377" comment="myspell-es_EC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519378" comment="myspell-es_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519379" comment="myspell-es_GT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519380" comment="myspell-es_HN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519381" comment="myspell-es_MX-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519382" comment="myspell-es_NI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519383" comment="myspell-es_PA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519384" comment="myspell-es_PE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519385" comment="myspell-es_PR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519386" comment="myspell-es_PY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519387" comment="myspell-es_SV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519388" comment="myspell-es_UY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519389" comment="myspell-es_VE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519390" comment="myspell-et_EE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519391" comment="myspell-fr_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519392" comment="myspell-fr_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519393" comment="myspell-fr_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519394" comment="myspell-fr_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519395" comment="myspell-fr_LU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519396" comment="myspell-fr_MC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519397" comment="myspell-gu_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519398" comment="myspell-he_IL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519399" comment="myspell-hi_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519400" comment="myspell-hr_HR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519401" comment="myspell-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519402" comment="myspell-it_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519403" comment="myspell-lightproof-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519404" comment="myspell-lightproof-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519405" comment="myspell-lightproof-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519406" comment="myspell-lightproof-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519407" comment="myspell-lo_LA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519408" comment="myspell-lt_LT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519409" comment="myspell-lv_LV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519410" comment="myspell-nb_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519411" comment="myspell-nl_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519412" comment="myspell-nl_NL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519413" comment="myspell-nn_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519414" comment="myspell-no-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519415" comment="myspell-pl_PL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519416" comment="myspell-pt_AO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519417" comment="myspell-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519418" comment="myspell-pt_PT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519419" comment="myspell-ro-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519420" comment="myspell-ro_RO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519421" comment="myspell-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519422" comment="myspell-sk_SK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519423" comment="myspell-sl_SI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519424" comment="myspell-sr-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519425" comment="myspell-sr_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519426" comment="myspell-sr_Latn_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519427" comment="myspell-sr_Latn_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519428" comment="myspell-sr_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519429" comment="myspell-sv_FI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519430" comment="myspell-sv_SE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519431" comment="myspell-te-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519432" comment="myspell-te_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519433" comment="myspell-th_TH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519434" comment="myspell-uk_UA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519435" comment="myspell-vi-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519436" comment="myspell-vi_VN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519437" comment="myspell-zu_ZA-20170511-16.2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7889" ref_url="https://www.suse.com/security/cve/CVE-2017-7889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7889/">CVE-2017-7889</cve>
	<bugzilla href="https://bugzilla.suse.com/1034405">SUSE bug 1034405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2366-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00016.html" source="SUSE-SU"/>
    <description>
    The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522663" comment="gd-2.1.0-24.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522664" comment="gd-32bit-2.1.0-24.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7941" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    The ReadAVSImage function in avs.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7943" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    The ReadSVGImage function in svg.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7948" ref_url="https://www.suse.com/security/cve/CVE-2017-7948" source="SUSE CVE"/>
    <description>
    Integer overflow in the mark_curve function in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7948/">CVE-2017-7948</cve>
	<bugzilla href="https://bugzilla.suse.com/1035036">SUSE bug 1035036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
    <description>
    The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960</cve>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521436" comment="libcroco-0_6-3-0.6.11-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521437" comment="libcroco-0_6-3-32bit-0.6.11-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7961" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE: third-party analysis reports "This is not a security issue in my view. The conversion surely is truncating the double into a long value, but there is no impact as the value is one of the RGB components."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961</cve>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132069">SUSE bug 1132069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521436" comment="libcroco-0_6-3-0.6.11-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521437" comment="libcroco-0_6-3-32bit-0.6.11-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7979" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7979" ref_url="https://www.suse.com/security/cve/CVE-2017-7979" source="SUSE CVE"/>
    <description>
    The cookie feature in the packet action API implementation in net/sched/act_api.c in the Linux kernel 4.11.x through 4.11-rc7 mishandles the tb nlattr array, which allows local users to cause a denial of service (uninitialized memory access and refcount underflow, and system hang or crash) or possibly have unspecified other impact via "tc filter add" commands in certain contexts. NOTE: this does not affect stable kernels, such as 4.10.x, from kernel.org.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7979/">CVE-2017-7979</cve>
	<bugzilla href="https://bugzilla.suse.com/1035107">SUSE bug 1035107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7980" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517318" comment="xen-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517319" comment="xen-kmp-default-4.5.5_10_k3.12.69_60.64.35-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517320" comment="xen-libs-4.5.5_10-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517321" comment="xen-libs-32bit-4.5.5_10-22.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7982" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<bugzilla href="https://bugzilla.suse.com/1035312">SUSE bug 1035312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155695" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517397" comment="libplist++1-1.8-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517398" comment="libplist1-1.8-10.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518636" comment="libplist++3-1.12-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518637" comment="libplist3-1.12-19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7994" ref_url="https://www.suse.com/security/cve/CVE-2017-7994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The function TextExtractor::ExtractText in TextExtractor.cpp:77 in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7994/">CVE-2017-7994</cve>
	<bugzilla href="https://bugzilla.suse.com/1035534">SUSE bug 1035534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
    <description>
    Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995</cve>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8053" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8053" ref_url="https://www.suse.com/security/cve/CVE-2017-8053" source="SUSE CVE"/>
    <description>
    PoDoFo 0.9.5 allows denial of service (infinite recursion and stack consumption) via a crafted PDF file in PoDoFo::PdfParser::ReadDocumentStructure (PdfParser.cpp).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8053/">CVE-2017-8053</cve>
	<bugzilla href="https://bugzilla.suse.com/1035592">SUSE bug 1035592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338990" comment="podofo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8054" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8054" ref_url="https://www.suse.com/security/cve/CVE-2017-8054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005711.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The function PdfPagesTree::GetPageNodeFromArray in PdfPageTree.cpp:464 in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8054/">CVE-2017-8054</cve>
	<bugzilla href="https://bugzilla.suse.com/1035596">SUSE bug 1035596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094315">SUSE bug 1094315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521960" comment="libpodofo0_9_2-0.9.2-3.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8061" ref_url="https://www.suse.com/security/cve/CVE-2017-8061" source="SUSE CVE"/>
    <description>
    drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8061/">CVE-2017-8061</cve>
	<bugzilla href="https://bugzilla.suse.com/1035693">SUSE bug 1035693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8062" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8062" ref_url="https://www.suse.com/security/cve/CVE-2017-8062" source="SUSE CVE"/>
    <description>
    drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8062/">CVE-2017-8062</cve>
	<bugzilla href="https://bugzilla.suse.com/1035691">SUSE bug 1035691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8063" ref_url="https://www.suse.com/security/cve/CVE-2017-8063" source="SUSE CVE"/>
    <description>
    drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8063/">CVE-2017-8063</cve>
	<bugzilla href="https://bugzilla.suse.com/1035689">SUSE bug 1035689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8064" ref_url="https://www.suse.com/security/cve/CVE-2017-8064" source="SUSE CVE"/>
    <description>
    drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8064/">CVE-2017-8064</cve>
	<bugzilla href="https://bugzilla.suse.com/1035681">SUSE bug 1035681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8065" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8065" ref_url="https://www.suse.com/security/cve/CVE-2017-8065" source="SUSE CVE"/>
    <description>
    crypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8065/">CVE-2017-8065</cve>
	<bugzilla href="https://bugzilla.suse.com/1035673">SUSE bug 1035673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8066" ref_url="https://www.suse.com/security/cve/CVE-2017-8066" source="SUSE CVE"/>
    <description>
    drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8066/">CVE-2017-8066</cve>
	<bugzilla href="https://bugzilla.suse.com/1035672">SUSE bug 1035672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8067" ref_url="https://www.suse.com/security/cve/CVE-2017-8067" source="SUSE CVE"/>
    <description>
    drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8067/">CVE-2017-8067</cve>
	<bugzilla href="https://bugzilla.suse.com/1035670">SUSE bug 1035670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8068" ref_url="https://www.suse.com/security/cve/CVE-2017-8068" source="SUSE CVE"/>
    <description>
    drivers/net/usb/pegasus.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8068/">CVE-2017-8068</cve>
	<bugzilla href="https://bugzilla.suse.com/1035669">SUSE bug 1035669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8069" ref_url="https://www.suse.com/security/cve/CVE-2017-8069" source="SUSE CVE"/>
    <description>
    drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8069/">CVE-2017-8069</cve>
	<bugzilla href="https://bugzilla.suse.com/1035668">SUSE bug 1035668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8070" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8070" ref_url="https://www.suse.com/security/cve/CVE-2017-8070" source="SUSE CVE"/>
    <description>
    drivers/net/usb/catc.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8070/">CVE-2017-8070</cve>
	<bugzilla href="https://bugzilla.suse.com/1035658">SUSE bug 1035658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8071" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8071" ref_url="https://www.suse.com/security/cve/CVE-2017-8071" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8071/">CVE-2017-8071</cve>
	<bugzilla href="https://bugzilla.suse.com/1035667">SUSE bug 1035667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8072" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8072" ref_url="https://www.suse.com/security/cve/CVE-2017-8072" source="SUSE CVE"/>
    <description>
    The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8072/">CVE-2017-8072</cve>
	<bugzilla href="https://bugzilla.suse.com/1035649">SUSE bug 1035649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8086" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086</cve>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00016.html" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079459">SUSE bug 1079459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518890" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518891" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518892" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8106" ref_url="https://www.suse.com/security/cve/CVE-2017-8106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8106/">CVE-2017-8106</cve>
	<bugzilla href="https://bugzilla.suse.com/1035877">SUSE bug 1035877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<bugzilla href="https://bugzilla.suse.com/1036211">SUSE bug 1036211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036470">SUSE bug 1036470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8284" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8284" ref_url="https://www.suse.com/security/cve/CVE-2017-8284" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: the vendor has stated "this bug does not violate any security guarantees QEMU makes."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8284/">CVE-2017-8284</cve>
	<bugzilla href="https://bugzilla.suse.com/1160901">SUSE bug 1160901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00016.html" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079459">SUSE bug 1079459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518890" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518891" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518892" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8288" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003146.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00101.html" source="SUSE-SU"/>
    <description>
    gnome-shell 3.22 through 3.24.1 mishandles extensions that fail to reload, which can lead to leaving extensions enabled in the lock screen. With these extensions, a bystander could launch applications (but not interact with them), see information from the extensions (e.g., what applications you have opened or what music you were playing), or even execute arbitrary commands. It all depends on what extensions a user has enabled. The problem is caused by lack of exception handling in js/ui/extensionSystem.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<bugzilla href="https://bugzilla.suse.com/1036494">SUSE bug 1036494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512168" comment="gnome-shell-3.20.4-77.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512169" comment="gnome-shell-browser-plugin-3.20.4-77.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512170" comment="gnome-shell-calendar-3.20.4-77.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512171" comment="gnome-shell-lang-3.20.4-77.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518033" comment="gnome-shell-3.20.4-77.7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518034" comment="gnome-shell-browser-plugin-3.20.4-77.7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518035" comment="gnome-shell-calendar-3.20.4-77.7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518036" comment="gnome-shell-lang-3.20.4-77.7.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517452" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517453" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517676" comment="xen-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517677" comment="xen-libs-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517678" comment="xen-libs-32bit-4.7.2_06-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8343" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8343" ref_url="https://www.suse.com/security/cve/CVE-2017-8343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadAAIImage function in aai.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8343/">CVE-2017-8343</cve>
	<bugzilla href="https://bugzilla.suse.com/1036977">SUSE bug 1036977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8344" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPCXImage function in pcx.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadDCMImage function in dcm.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8347" ref_url="https://www.suse.com/security/cve/CVE-2017-8347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadEXRImage function in exr.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8347/">CVE-2017-8347</cve>
	<bugzilla href="https://bugzilla.suse.com/1036982">SUSE bug 1036982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMATImage function in mat.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadSFWImage function in sfw.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00028.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadJNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8351" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPCDImage function in pcd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8352" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadXWDImage function in xwd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPICTImage function in pict.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055010">SUSE bug 1055010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8354" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadBMPImage function in bmp.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMTVImage function in mtv.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8356" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8356" ref_url="https://www.suse.com/security/cve/CVE-2017-8356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadSUNImage function in sun.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8356/">CVE-2017-8356</cve>
	<bugzilla href="https://bugzilla.suse.com/1036991">SUSE bug 1036991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8357" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadEPTImage function in ept.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8358" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8358" ref_url="https://www.suse.com/security/cve/CVE-2017-8358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003174.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1851-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00065.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 2017-03-17 has an out-of-bounds write caused by a heap-based buffer overflow related to the ReadJPEG function in vcl/source/filter/jpeg/jpegc.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8358/">CVE-2017-8358</cve>
	<bugzilla href="https://bugzilla.suse.com/1036975">SUSE bug 1036975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517712" comment="libixion-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517713" comment="libmwaw-0_3-3-0.3.11-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517714" comment="liborcus-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517715" comment="libreoffice-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517716" comment="libreoffice-base-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517717" comment="libreoffice-base-drivers-mysql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517718" comment="libreoffice-base-drivers-postgresql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517719" comment="libreoffice-calc-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517720" comment="libreoffice-calc-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517721" comment="libreoffice-draw-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517722" comment="libreoffice-filters-optional-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517723" comment="libreoffice-gnome-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517724" comment="libreoffice-icon-theme-galaxy-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517725" comment="libreoffice-icon-theme-tango-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517726" comment="libreoffice-impress-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517727" comment="libreoffice-l10n-af-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517728" comment="libreoffice-l10n-ar-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517729" comment="libreoffice-l10n-ca-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517730" comment="libreoffice-l10n-cs-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517731" comment="libreoffice-l10n-da-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517732" comment="libreoffice-l10n-de-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517733" comment="libreoffice-l10n-en-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517734" comment="libreoffice-l10n-es-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517735" comment="libreoffice-l10n-fi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517736" comment="libreoffice-l10n-fr-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517737" comment="libreoffice-l10n-gu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517738" comment="libreoffice-l10n-hi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517739" comment="libreoffice-l10n-hu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517740" comment="libreoffice-l10n-it-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517741" comment="libreoffice-l10n-ja-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517742" comment="libreoffice-l10n-ko-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517743" comment="libreoffice-l10n-nb-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517744" comment="libreoffice-l10n-nl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517745" comment="libreoffice-l10n-nn-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517746" comment="libreoffice-l10n-pl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517747" comment="libreoffice-l10n-pt_BR-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517748" comment="libreoffice-l10n-pt_PT-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517749" comment="libreoffice-l10n-ro-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517750" comment="libreoffice-l10n-ru-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517751" comment="libreoffice-l10n-sk-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517752" comment="libreoffice-l10n-sv-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517753" comment="libreoffice-l10n-xh-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517754" comment="libreoffice-l10n-zh_CN-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517755" comment="libreoffice-l10n-zh_TW-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517756" comment="libreoffice-l10n-zu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517757" comment="libreoffice-mailmerge-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517758" comment="libreoffice-math-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517759" comment="libreoffice-officebean-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517760" comment="libreoffice-pyuno-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517761" comment="libreoffice-writer-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517762" comment="libreoffice-writer-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517763" comment="libreofficekit-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517764" comment="libstaroffice-0_0-0-0.0.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517765" comment="libzmf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517766" comment="myspell-af_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517767" comment="myspell-af_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517768" comment="myspell-ar-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517769" comment="myspell-ar_AE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517770" comment="myspell-ar_BH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517771" comment="myspell-ar_DZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517772" comment="myspell-ar_EG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517773" comment="myspell-ar_IQ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517774" comment="myspell-ar_JO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517775" comment="myspell-ar_KW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517776" comment="myspell-ar_LB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517777" comment="myspell-ar_LY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517778" comment="myspell-ar_MA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517779" comment="myspell-ar_OM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517780" comment="myspell-ar_QA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517781" comment="myspell-ar_SA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517782" comment="myspell-ar_SD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517783" comment="myspell-ar_SY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517784" comment="myspell-ar_TN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517785" comment="myspell-ar_YE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517786" comment="myspell-be_BY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517787" comment="myspell-bg_BG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517788" comment="myspell-bn_BD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517789" comment="myspell-bn_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517790" comment="myspell-bs-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517791" comment="myspell-bs_BA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517792" comment="myspell-ca-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517793" comment="myspell-ca_AD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517794" comment="myspell-ca_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517795" comment="myspell-ca_ES_valencia-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517796" comment="myspell-ca_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517797" comment="myspell-ca_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517798" comment="myspell-cs_CZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517799" comment="myspell-da_DK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517800" comment="myspell-de-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517801" comment="myspell-de_AT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517802" comment="myspell-de_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517803" comment="myspell-de_DE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517804" comment="myspell-dictionaries-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517805" comment="myspell-el_GR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517806" comment="myspell-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517807" comment="myspell-en_AU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517808" comment="myspell-en_BS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517809" comment="myspell-en_BZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517810" comment="myspell-en_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517811" comment="myspell-en_GB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517812" comment="myspell-en_GH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517813" comment="myspell-en_IE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517814" comment="myspell-en_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517815" comment="myspell-en_JM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517816" comment="myspell-en_MW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517817" comment="myspell-en_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517818" comment="myspell-en_NZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517819" comment="myspell-en_PH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517820" comment="myspell-en_TT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517821" comment="myspell-en_US-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517822" comment="myspell-en_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517823" comment="myspell-en_ZW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517824" comment="myspell-es-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517825" comment="myspell-es_AR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517826" comment="myspell-es_BO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517827" comment="myspell-es_CL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517828" comment="myspell-es_CO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517829" comment="myspell-es_CR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517830" comment="myspell-es_CU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517831" comment="myspell-es_DO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517832" comment="myspell-es_EC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517833" comment="myspell-es_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517834" comment="myspell-es_GT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517835" comment="myspell-es_HN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517836" comment="myspell-es_MX-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517837" comment="myspell-es_NI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517838" comment="myspell-es_PA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517839" comment="myspell-es_PE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517840" comment="myspell-es_PR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517841" comment="myspell-es_PY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517842" comment="myspell-es_SV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517843" comment="myspell-es_UY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517844" comment="myspell-es_VE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517845" comment="myspell-et_EE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517846" comment="myspell-fr_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517847" comment="myspell-fr_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517848" comment="myspell-fr_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517849" comment="myspell-fr_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517850" comment="myspell-fr_LU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517851" comment="myspell-fr_MC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517852" comment="myspell-gu_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517853" comment="myspell-he_IL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517854" comment="myspell-hi_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517855" comment="myspell-hr_HR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517856" comment="myspell-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517857" comment="myspell-it_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517858" comment="myspell-lightproof-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517859" comment="myspell-lightproof-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517860" comment="myspell-lightproof-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517861" comment="myspell-lightproof-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517862" comment="myspell-lo_LA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517863" comment="myspell-lt_LT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517864" comment="myspell-lv_LV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517865" comment="myspell-nb_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517866" comment="myspell-nl_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517867" comment="myspell-nl_NL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517868" comment="myspell-nn_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517869" comment="myspell-no-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517870" comment="myspell-pl_PL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517871" comment="myspell-pt_AO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517872" comment="myspell-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517873" comment="myspell-pt_PT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517874" comment="myspell-ro-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517875" comment="myspell-ro_RO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517876" comment="myspell-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517877" comment="myspell-sk_SK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517878" comment="myspell-sl_SI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517879" comment="myspell-sr-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517880" comment="myspell-sr_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517881" comment="myspell-sr_Latn_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517882" comment="myspell-sr_Latn_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517883" comment="myspell-sr_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517884" comment="myspell-sv_FI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517885" comment="myspell-sv_SE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517886" comment="myspell-te-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517887" comment="myspell-te_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517888" comment="myspell-th_TH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517889" comment="myspell-uk_UA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517890" comment="myspell-vi-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517891" comment="myspell-vi_VN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517892" comment="myspell-zu_ZA-20170511-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519257" comment="libixion-0_12-0-0.12.1-13.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519258" comment="libmwaw-0_3-3-0.3.11-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519259" comment="liborcus-0_12-0-0.12.1-10.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519260" comment="libreoffice-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519261" comment="libreoffice-base-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519262" comment="libreoffice-base-drivers-mysql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519263" comment="libreoffice-base-drivers-postgresql-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519264" comment="libreoffice-calc-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519265" comment="libreoffice-calc-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519266" comment="libreoffice-draw-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519267" comment="libreoffice-filters-optional-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519268" comment="libreoffice-gnome-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519269" comment="libreoffice-icon-theme-galaxy-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519270" comment="libreoffice-icon-theme-tango-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519271" comment="libreoffice-impress-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519272" comment="libreoffice-l10n-af-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519273" comment="libreoffice-l10n-ar-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519274" comment="libreoffice-l10n-ca-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519275" comment="libreoffice-l10n-cs-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519276" comment="libreoffice-l10n-da-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519277" comment="libreoffice-l10n-de-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519278" comment="libreoffice-l10n-en-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519279" comment="libreoffice-l10n-es-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519280" comment="libreoffice-l10n-fi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519281" comment="libreoffice-l10n-fr-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519282" comment="libreoffice-l10n-gu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519283" comment="libreoffice-l10n-hi-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519284" comment="libreoffice-l10n-hu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519285" comment="libreoffice-l10n-it-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519286" comment="libreoffice-l10n-ja-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519287" comment="libreoffice-l10n-ko-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519288" comment="libreoffice-l10n-nb-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519289" comment="libreoffice-l10n-nl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519290" comment="libreoffice-l10n-nn-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519291" comment="libreoffice-l10n-pl-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519292" comment="libreoffice-l10n-pt_BR-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519293" comment="libreoffice-l10n-pt_PT-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519294" comment="libreoffice-l10n-ro-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519295" comment="libreoffice-l10n-ru-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519296" comment="libreoffice-l10n-sk-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519297" comment="libreoffice-l10n-sv-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519298" comment="libreoffice-l10n-xh-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519299" comment="libreoffice-l10n-zh_CN-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519300" comment="libreoffice-l10n-zh_TW-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519301" comment="libreoffice-l10n-zu-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519302" comment="libreoffice-mailmerge-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519303" comment="libreoffice-math-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519304" comment="libreoffice-officebean-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519305" comment="libreoffice-pyuno-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519306" comment="libreoffice-writer-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519307" comment="libreoffice-writer-extensions-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519308" comment="libreofficekit-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519309" comment="libstaroffice-0_0-0-0.0.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519310" comment="libzmf-0_0-0-0.0.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519311" comment="myspell-af_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519312" comment="myspell-af_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519313" comment="myspell-ar-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519314" comment="myspell-ar_AE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519315" comment="myspell-ar_BH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519316" comment="myspell-ar_DZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519317" comment="myspell-ar_EG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519318" comment="myspell-ar_IQ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519319" comment="myspell-ar_JO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519320" comment="myspell-ar_KW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519321" comment="myspell-ar_LB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519322" comment="myspell-ar_LY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519323" comment="myspell-ar_MA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519324" comment="myspell-ar_OM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519325" comment="myspell-ar_QA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519326" comment="myspell-ar_SA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519327" comment="myspell-ar_SD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519328" comment="myspell-ar_SY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519329" comment="myspell-ar_TN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519330" comment="myspell-ar_YE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519331" comment="myspell-be_BY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519332" comment="myspell-bg_BG-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519333" comment="myspell-bn_BD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519334" comment="myspell-bn_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519335" comment="myspell-bs-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519336" comment="myspell-bs_BA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519337" comment="myspell-ca-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519338" comment="myspell-ca_AD-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519339" comment="myspell-ca_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519340" comment="myspell-ca_ES_valencia-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519341" comment="myspell-ca_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519342" comment="myspell-ca_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519343" comment="myspell-cs_CZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519344" comment="myspell-da_DK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519345" comment="myspell-de-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519346" comment="myspell-de_AT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519347" comment="myspell-de_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519348" comment="myspell-de_DE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519349" comment="myspell-dictionaries-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519350" comment="myspell-el_GR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519351" comment="myspell-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519352" comment="myspell-en_AU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519353" comment="myspell-en_BS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519354" comment="myspell-en_BZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519355" comment="myspell-en_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519356" comment="myspell-en_GB-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519357" comment="myspell-en_GH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519358" comment="myspell-en_IE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519359" comment="myspell-en_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519360" comment="myspell-en_JM-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519361" comment="myspell-en_MW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519362" comment="myspell-en_NA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519363" comment="myspell-en_NZ-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519364" comment="myspell-en_PH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519365" comment="myspell-en_TT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519366" comment="myspell-en_US-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519367" comment="myspell-en_ZA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519368" comment="myspell-en_ZW-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519369" comment="myspell-es-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519370" comment="myspell-es_AR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519371" comment="myspell-es_BO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519372" comment="myspell-es_CL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519373" comment="myspell-es_CO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519374" comment="myspell-es_CR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519375" comment="myspell-es_CU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519376" comment="myspell-es_DO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519377" comment="myspell-es_EC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519378" comment="myspell-es_ES-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519379" comment="myspell-es_GT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519380" comment="myspell-es_HN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519381" comment="myspell-es_MX-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519382" comment="myspell-es_NI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519383" comment="myspell-es_PA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519384" comment="myspell-es_PE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519385" comment="myspell-es_PR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519386" comment="myspell-es_PY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519387" comment="myspell-es_SV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519388" comment="myspell-es_UY-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519389" comment="myspell-es_VE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519390" comment="myspell-et_EE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519391" comment="myspell-fr_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519392" comment="myspell-fr_CA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519393" comment="myspell-fr_CH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519394" comment="myspell-fr_FR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519395" comment="myspell-fr_LU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519396" comment="myspell-fr_MC-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519397" comment="myspell-gu_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519398" comment="myspell-he_IL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519399" comment="myspell-hi_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519400" comment="myspell-hr_HR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519401" comment="myspell-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519402" comment="myspell-it_IT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519403" comment="myspell-lightproof-en-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519404" comment="myspell-lightproof-hu_HU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519405" comment="myspell-lightproof-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519406" comment="myspell-lightproof-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519407" comment="myspell-lo_LA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519408" comment="myspell-lt_LT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519409" comment="myspell-lv_LV-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519410" comment="myspell-nb_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519411" comment="myspell-nl_BE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519412" comment="myspell-nl_NL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519413" comment="myspell-nn_NO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519414" comment="myspell-no-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519415" comment="myspell-pl_PL-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519416" comment="myspell-pt_AO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519417" comment="myspell-pt_BR-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519418" comment="myspell-pt_PT-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519419" comment="myspell-ro-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519420" comment="myspell-ro_RO-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519421" comment="myspell-ru_RU-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519422" comment="myspell-sk_SK-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519423" comment="myspell-sl_SI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519424" comment="myspell-sr-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519425" comment="myspell-sr_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519426" comment="myspell-sr_Latn_CS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519427" comment="myspell-sr_Latn_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519428" comment="myspell-sr_RS-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519429" comment="myspell-sv_FI-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519430" comment="myspell-sv_SE-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519431" comment="myspell-te-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519432" comment="myspell-te_IN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519433" comment="myspell-th_TH-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519434" comment="myspell-uk_UA-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519435" comment="myspell-vi-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519436" comment="myspell-vi_VN-20170511-16.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519437" comment="myspell-zu_ZA-20170511-16.2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8361" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8362" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8363" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    The i2les_array function in pcm.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<bugzilla href="https://bugzilla.suse.com/1037334">SUSE bug 1037334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the "megasas_mmio_write" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<bugzilla href="https://bugzilla.suse.com/1037336">SUSE bug 1037336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8392" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8395" ref_url="https://www.suse.com/security/cve/CVE-2017-8395" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid write of size 8 because of missing a malloc() return-value check to see if memory had actually been allocated in the _bfd_generic_get_section_contents function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8395/">CVE-2017-8395</cve>
	<bugzilla href="https://bugzilla.suse.com/1037062">SUSE bug 1037062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8397" ref_url="https://www.suse.com/security/cve/CVE-2017-8397" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 and an invalid write of size 1 during processing of a corrupt binary containing reloc(s) with negative addresses. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8397/">CVE-2017-8397</cve>
	<bugzilla href="https://bugzilla.suse.com/1037070">SUSE bug 1037070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8398" ref_url="https://www.suse.com/security/cve/CVE-2017-8398" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    dwarf.c in GNU Binutils 2.28 is vulnerable to an invalid read of size 1 during dumping of debug information from a corrupt binary. This vulnerability causes programs that conduct an analysis of binary programs, such as objdump and readelf, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8398/">CVE-2017-8398</cve>
	<bugzilla href="https://bugzilla.suse.com/1037072">SUSE bug 1037072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8422" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422</cve>
	<bugzilla href="https://bugzilla.suse.com/1033300">SUSE bug 1033300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036244">SUSE bug 1036244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041511">SUSE bug 1041511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749065">SUSE bug 749065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869959">SUSE bug 869959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155614" comment="libkde4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155615" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155616" comment="libkdecore4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155617" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155618" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155619" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517376" comment="libkde4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517377" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517378" comment="libkdecore4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517379" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517380" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517381" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8765" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    The function named ReadICONImage in coders\icon.c in ImageMagick 7.0.5-5 has a memory leak vulnerability which can cause memory exhaustion via a crafted ICON file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00071.html" source="SUSE-SU"/>
    <description>
    rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101814">SUSE bug 1101814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798028">SUSE bug 798028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009155553" comment="libtirpc-netconfig-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155554" comment="libtirpc3-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155555" comment="libtirpc3-32bit-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155620" comment="rpcbind-0.2.3-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512497" comment="libtirpc-netconfig-1.0.1-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512498" comment="libtirpc3-1.0.1-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512499" comment="libtirpc3-32bit-1.0.1-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009155620" comment="rpcbind-0.2.3-23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517363" comment="libtirpc1-0.2.3-13.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517364" comment="libtirpc1-32bit-0.2.3-13.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517375" comment="rpcbind-0.2.1_rc4-17.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518632" comment="libtirpc-netconfig-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518633" comment="libtirpc3-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518634" comment="libtirpc3-32bit-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518635" comment="rpcbind-0.2.3-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8787" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8787" ref_url="https://www.suse.com/security/cve/CVE-2017-8787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The PoDoFo::PdfXRefStreamParserObject::ReadXRefStreamEntry function in base/PdfXRefStreamParserObject.cpp:224 in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8787/">CVE-2017-8787</cve>
	<bugzilla href="https://bugzilla.suse.com/1037739">SUSE bug 1037739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8797" ref_url="https://www.suse.com/security/cve/CVE-2017-8797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8797/">CVE-2017-8797</cve>
	<bugzilla href="https://bugzilla.suse.com/1046202">SUSE bug 1046202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046206">SUSE bug 1046206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references]
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518942" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518943" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518944" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518945" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518947" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518948" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518949" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00064.html" source="SUSE-SU"/>
    <description>
    The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816</cve>
	<bugzilla href="https://bugzilla.suse.com/1069226">SUSE bug 1069226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519186" comment="curl-7.37.0-37.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519187" comment="libcurl4-7.37.0-37.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519188" comment="libcurl4-32bit-7.37.0-37.11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00064.html" source="SUSE-SU"/>
    <description>
    The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817</cve>
	<bugzilla href="https://bugzilla.suse.com/1069222">SUSE bug 1069222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519186" comment="curl-7.37.0-37.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519187" comment="libcurl4-7.37.0-37.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519188" comment="libcurl4-32bit-7.37.0-37.11.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818" source="SUSE CVE"/>
    <description>
    curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818</cve>
	<bugzilla href="https://bugzilla.suse.com/1069714">SUSE bug 1069714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076734">SUSE bug 1076734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-6, the ReadBMPImage function in bmp.c:1379 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00007.html" source="SUSE-SU"/>
    <description>
    The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521436" comment="libcroco-0_6-3-0.6.11-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521437" comment="libcroco-0_6-3-32bit-0.6.11-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00007.html" source="SUSE-SU"/>
    <description>
    The cr_parser_parse_selector_core function in cr-parser.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521436" comment="libcroco-0_6-3-0.6.11-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521437" comment="libcroco-0_6-3-32bit-0.6.11-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2190-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00067.html" source="SUSE-SU"/>
    <description>
    The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518017" comment="libxml2-2-2.9.4-46.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518018" comment="libxml2-2-32bit-2.9.4-46.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518019" comment="libxml2-tools-2.9.4-46.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518020" comment="python-libxml2-2.9.4-46.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038564">SUSE bug 1038564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8908" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8908" ref_url="https://www.suse.com/security/cve/CVE-2017-8908" source="SUSE CVE"/>
    <description>
    The mark_line_tr function in gxscanc.c in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8908/">CVE-2017-8908</cve>
	<bugzilla href="https://bugzilla.suse.com/1038835">SUSE bug 1038835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<bugzilla href="https://bugzilla.suse.com/1037182">SUSE bug 1037182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<bugzilla href="https://bugzilla.suse.com/1037183">SUSE bug 1037183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9022" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002934.html" source="SUSE-SU"/>
    <description>
    The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518697" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518698" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518699" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518700" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9023" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002934.html" source="SUSE-SU"/>
    <description>
    The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518697" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518698" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518699" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518700" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9038" ref_url="https://www.suse.com/security/cve/CVE-2017-9038" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9038/">CVE-2017-9038</cve>
	<bugzilla href="https://bugzilla.suse.com/1038874">SUSE bug 1038874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9039" ref_url="https://www.suse.com/security/cve/CVE-2017-9039" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9039/">CVE-2017-9039</cve>
	<bugzilla href="https://bugzilla.suse.com/1038875">SUSE bug 1038875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9040" ref_url="https://www.suse.com/security/cve/CVE-2017-9040" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9040/">CVE-2017-9040</cve>
	<bugzilla href="https://bugzilla.suse.com/1038876">SUSE bug 1038876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038877">SUSE bug 1038877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9041" ref_url="https://www.suse.com/security/cve/CVE-2017-9041" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to MIPS GOT mishandling in the process_mips_specific function in readelf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9041/">CVE-2017-9041</cve>
	<bugzilla href="https://bugzilla.suse.com/1038874">SUSE bug 1038874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038877">SUSE bug 1038877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9042" ref_url="https://www.suse.com/security/cve/CVE-2017-9042" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9042/">CVE-2017-9042</cve>
	<bugzilla href="https://bugzilla.suse.com/1038878">SUSE bug 1038878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9043" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9043" ref_url="https://www.suse.com/security/cve/CVE-2017-9043" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    readelf.c in GNU Binutils 2017-04-12 has a "shift exponent too large for type unsigned long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9043/">CVE-2017-9043</cve>
	<bugzilla href="https://bugzilla.suse.com/1038880">SUSE bug 1038880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9044" ref_url="https://www.suse.com/security/cve/CVE-2017-9044" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The print_symbol_for_build_attribute function in readelf.c in GNU Binutils 2017-04-12 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9044/">CVE-2017-9044</cve>
	<bugzilla href="https://bugzilla.suse.com/1038881">SUSE bug 1038881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00071.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content-&gt;type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-&gt;prefix is appended to buf (if it actually fits) whereupon (ii) content-&gt;name is written to the buffer. However, the check for whether the content-&gt;name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039657">SUSE bug 1039657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518710" comment="libxml2-2-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518711" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518712" comment="libxml2-tools-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518713" comment="python-libxml2-2.9.4-39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00071.html" source="SUSE-SU"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 &lt; size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039658">SUSE bug 1039658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518710" comment="libxml2-2-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518711" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518712" comment="libxml2-tools-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518713" comment="python-libxml2-2.9.4-39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00071.html" source="SUSE-SU"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039659">SUSE bug 1039659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518710" comment="libxml2-2-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518711" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518712" comment="libxml2-tools-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518713" comment="python-libxml2-2.9.4-39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00071.html" source="SUSE-SU"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518710" comment="libxml2-2-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518711" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518712" comment="libxml2-tools-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518713" comment="python-libxml2-2.9.4-39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9059" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9059" ref_url="https://www.suse.com/security/cve/CVE-2017-9059" source="SUSE CVE"/>
    <description>
    The NFSv4 implementation in the Linux kernel through 4.11.1 allows local users to cause a denial of service (resource consumption) by leveraging improper channel callback shutdown when unmounting an NFSv4 filesystem, aka a "module reference and kernel daemon" leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9059/">CVE-2017-9059</cve>
	<bugzilla href="https://bugzilla.suse.com/1039674">SUSE bug 1039674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9060" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9060" ref_url="https://www.suse.com/security/cve/CVE-2017-9060" source="SUSE CVE"/>
    <description>
    Memory leak in the virtio_gpu_set_scanout function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (memory consumption) via a large number of "VIRTIO_GPU_CMD_SET_SCANOUT:" commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9060/">CVE-2017-9060</cve>
	<bugzilla href="https://bugzilla.suse.com/1039886">SUSE bug 1039886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9083" ref_url="https://www.suse.com/security/cve/CVE-2017-9083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002979.html" source="SUSE-SU"/>
    <description>
    poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9083/">CVE-2017-9083</cve>
	<bugzilla href="https://bugzilla.suse.com/1040170">SUSE bug 1040170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517653" comment="libpoppler44-0.24.4-14.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9098" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9110" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00013.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172641" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172642" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172643" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518979" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518980" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518981" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111</cve>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522007" comment="libIlmImf-Imf_2_1-21-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522008" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522009" comment="openexr-2.1.0-6.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 1 in the getBits function in ImfHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112</cve>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522007" comment="libIlmImf-Imf_2_1-21-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522008" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522009" comment="openexr-2.1.0-6.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9113" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113</cve>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522007" comment="libIlmImf-Imf_2_1-21-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522008" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522009" comment="openexr-2.1.0-6.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9114" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00013.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009172641" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172642" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009172643" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518979" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518980" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518981" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 2 in the = operator function in half.h could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115</cve>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522007" comment="libIlmImf-Imf_2_1-21-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522008" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522009" comment="openexr-2.1.0-6.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9116" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9116" ref_url="https://www.suse.com/security/cve/CVE-2017-9116" source="SUSE CVE"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 1 in the uncompress function in ImfZip.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9116/">CVE-2017-9116</cve>
	<bugzilla href="https://bugzilla.suse.com/1040116">SUSE bug 1040116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334075" comment="openexr is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9122" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_read_moov function in moov.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122</cve>
	<bugzilla href="https://bugzilla.suse.com/1044000">SUSE bug 1044000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044077">SUSE bug 1044077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051855">SUSE bug 1051855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051859">SUSE bug 1051859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517698" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9123" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The lqt_frame_duration function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123</cve>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517698" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9124" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_match_32 function in util.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124</cve>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517698" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9125" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The lqt_frame_duration function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125</cve>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517698" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_read_dref_table function in dref.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126</cve>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517698" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9127" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_user_atoms_read_atom function in useratoms.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127</cve>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517698" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9128" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_video_width function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128</cve>
	<bugzilla href="https://bugzilla.suse.com/1044000">SUSE bug 1044000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044077">SUSE bug 1044077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051855">SUSE bug 1051855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051859">SUSE bug 1051859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517698" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9141" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1511-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9143" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9144" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048936">SUSE bug 1048936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9150" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9150" ref_url="https://www.suse.com/security/cve/CVE-2017-9150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9150/">CVE-2017-9150</cve>
	<bugzilla href="https://bugzilla.suse.com/1040279">SUSE bug 1040279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9208" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to releaseResolved functions, aka qpdf-infiniteloop1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to QPDFObjectHandle::parseInternal, aka qpdf-infiniteloop2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9210" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to unparse functions, aka qpdf-infiniteloop3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9211" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9211" ref_url="https://www.suse.com/security/cve/CVE-2017-9211" source="SUSE CVE"/>
    <description>
    The crypto_skcipher_init_tfm function in crypto/skcipher.c in the Linux kernel through 4.11.2 relies on a setkey function that lacks a key-size check, which allows local users to cause a denial of service (NULL pointer dereference) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9211/">CVE-2017-9211</cve>
	<bugzilla href="https://bugzilla.suse.com/1040389">SUSE bug 1040389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9216" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9217" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9217" ref_url="https://www.suse.com/security/cve/CVE-2017-9217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1844-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00054.html" source="SUSE-SU"/>
    <description>
    systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9217/">CVE-2017-9217</cve>
	<bugzilla href="https://bugzilla.suse.com/1040614">SUSE bug 1040614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517688" comment="libsystemd0-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517689" comment="libsystemd0-32bit-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517690" comment="libudev1-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517691" comment="libudev1-32bit-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517692" comment="systemd-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517693" comment="systemd-32bit-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517694" comment="systemd-bash-completion-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517695" comment="systemd-sysvinit-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517696" comment="udev-228-149.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519195" comment="libsystemd0-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519196" comment="libsystemd0-32bit-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519197" comment="libudev1-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519198" comment="libudev1-32bit-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519199" comment="systemd-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519200" comment="systemd-32bit-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519201" comment="systemd-bash-completion-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519202" comment="systemd-sysvinit-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519203" comment="udev-228-150.9.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9225" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9225" ref_url="https://www.suse.com/security/cve/CVE-2017-9225" source="SUSE CVE"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A malformed regular expression could result in 4 bytes being written off the end of a stack buffer of expand_case_fold_string() during the call to onigenc_unicode_get_case_fold_codes_by_str(), a typical stack buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9225/">CVE-2017-9225</cve>
	<bugzilla href="https://bugzilla.suse.com/1040890">SUSE bug 1040890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334192" comment="ruby2.1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<bugzilla href="https://bugzilla.suse.com/1068376">SUSE bug 1068376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg-&gt;dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<bugzilla href="https://bugzilla.suse.com/1068376">SUSE bug 1068376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00004.html" source="SUSE-SU"/>
    <description>
    XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073350">SUSE bug 1073350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123115">SUSE bug 1123115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518043" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518044" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518045" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042892">SUSE bug 1042892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-6 Q16, the ReadMNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9262" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-6 Q16, the ReadJNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9269" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004582.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00035.html" source="SUSE-SU"/>
    <description>
    In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512570" comment="libzypp-16.19.0-2.36.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512642" comment="zypper-1.13.45-21.23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512643" comment="zypper-log-1.13.45-21.23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517971" comment="libzypp-16.15.2-27.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517972" comment="zypper-1.13.30-18.13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517973" comment="zypper-log-1.13.30-18.13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520073" comment="libzypp-16.17.20-2.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519249" comment="yast2-pkg-bindings-3.2.4-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520074" comment="zypper-1.13.45-21.21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520075" comment="zypper-log-1.13.45-21.21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9287" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2181-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00063.html" source="SUSE-SU"/>
    <description>
    servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287</cve>
	<bugzilla href="https://bugzilla.suse.com/1041764">SUSE bug 1041764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009156765" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156766" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009156768" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512344" comment="libldap-2_4-2-2.4.41-18.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512345" comment="libldap-2_4-2-32bit-2.4.41-18.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512346" comment="openldap2-client-2.4.41-18.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518714" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518715" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518716" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9330" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043157">SUSE bug 1043157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517676" comment="xen-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517677" comment="xen-libs-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517678" comment="xen-libs-32bit-4.7.2_06-42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9343" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-msnip.c by validating an IPv4 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9344" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-dof.c by validating a size value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9351" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9352" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9354" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9373" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in QEMU (aka Quick Emulator), when built with IDE AHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the AHCI device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373</cve>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9374" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9374" ref_url="https://www.suse.com/security/cve/CVE-2017-9374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9374/">CVE-2017-9374</cve>
	<bugzilla href="https://bugzilla.suse.com/1043073">SUSE bug 1043073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043074">SUSE bug 1043074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with USB xHCI controller emulator support, allows local guest OS privileged users to cause a denial of service (infinite recursive call) via vectors involving control transfer descriptors sequencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375</cve>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9403" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.7, a memory leak vulnerability was found in the function TIFFReadDirEntryLong8Array in tif_dirread.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<bugzilla href="https://bugzilla.suse.com/1042805">SUSE bug 1042805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045688">SUSE bug 1045688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9404" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.7, a memory leak vulnerability was found in the function OJPEGReadHeaderInfoSecTablesQTable in tif_ojpeg.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<bugzilla href="https://bugzilla.suse.com/1042804">SUSE bug 1042804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.54.0, a memory leak vulnerability was found in the function gmalloc in gmem.cc, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406</cve>
	<bugzilla href="https://bugzilla.suse.com/1042803">SUSE bug 1042803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517653" comment="libpoppler44-0.24.4-14.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPALMImage function in palm.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.54.0, a memory leak vulnerability was found in the function Object::initArray in Object.cc, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408</cve>
	<bugzilla href="https://bugzilla.suse.com/1042802">SUSE bug 1042802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517939" comment="libpoppler44-0.24.4-14.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9409" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMPCImage function in mpc.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9432" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9432" ref_url="https://www.suse.com/security/cve/CVE-2017-9432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003960.html" source="SUSE-SU"/>
    <description>
    Document Liberation Project libstaroffice before 2017-04-07 has an out-of-bounds write caused by a stack-based buffer overflow related to the DatabaseName::read function in lib/StarWriterStruct.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9432/">CVE-2017-9432</cve>
	<bugzilla href="https://bugzilla.suse.com/1042829">SUSE bug 1042829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174959" comment="libstaroffice-0_0-0-0.0.5-7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520680" comment="boost-license1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520681" comment="gnome-documents-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520682" comment="gnome-documents-lang-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520683" comment="gnome-documents_books-common-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520684" comment="gnome-shell-search-provider-documents-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520685" comment="libboost_atomic1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520686" comment="libboost_date_time1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520687" comment="libboost_filesystem1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520688" comment="libboost_iostreams1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520689" comment="libboost_locale1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520690" comment="libboost_program_options1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520691" comment="libboost_random1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520692" comment="libboost_regex1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520693" comment="libboost_signals1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520694" comment="libboost_system1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520695" comment="libboost_thread1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520696" comment="libepubgen-0_1-1-0.1.0-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520697" comment="libixion-0_13-0-0.13.0-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520698" comment="libmwaw-0_3-3-0.3.13-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520699" comment="liborcus-0_13-0-0.13.4-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520700" comment="libqxp-0_0-0-0.0.1-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520701" comment="libreoffice-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520702" comment="libreoffice-base-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520703" comment="libreoffice-base-drivers-mysql-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520704" comment="libreoffice-base-drivers-postgresql-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520705" comment="libreoffice-branding-upstream-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520706" comment="libreoffice-calc-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520707" comment="libreoffice-calc-extensions-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520708" comment="libreoffice-draw-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520709" comment="libreoffice-filters-optional-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520710" comment="libreoffice-gnome-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520711" comment="libreoffice-gtk2-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520712" comment="libreoffice-icon-themes-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520713" comment="libreoffice-impress-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520714" comment="libreoffice-l10n-af-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520715" comment="libreoffice-l10n-ar-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520716" comment="libreoffice-l10n-ca-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520717" comment="libreoffice-l10n-cs-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520718" comment="libreoffice-l10n-da-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520719" comment="libreoffice-l10n-de-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520720" comment="libreoffice-l10n-en-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520721" comment="libreoffice-l10n-es-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520722" comment="libreoffice-l10n-fi-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520723" comment="libreoffice-l10n-fr-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520724" comment="libreoffice-l10n-gu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520725" comment="libreoffice-l10n-hi-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520726" comment="libreoffice-l10n-hu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520727" comment="libreoffice-l10n-it-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520728" comment="libreoffice-l10n-ja-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520729" comment="libreoffice-l10n-ko-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520730" comment="libreoffice-l10n-nb-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520731" comment="libreoffice-l10n-nl-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520732" comment="libreoffice-l10n-nn-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520733" comment="libreoffice-l10n-pl-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520734" comment="libreoffice-l10n-pt_BR-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520735" comment="libreoffice-l10n-pt_PT-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520736" comment="libreoffice-l10n-ro-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520737" comment="libreoffice-l10n-ru-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520738" comment="libreoffice-l10n-sk-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520739" comment="libreoffice-l10n-sv-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520740" comment="libreoffice-l10n-xh-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520741" comment="libreoffice-l10n-zh_CN-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520742" comment="libreoffice-l10n-zh_TW-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520743" comment="libreoffice-l10n-zu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520744" comment="libreoffice-mailmerge-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520745" comment="libreoffice-math-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520746" comment="libreoffice-officebean-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520747" comment="libreoffice-pyuno-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520748" comment="libreoffice-writer-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520749" comment="libreoffice-writer-extensions-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520750" comment="libstaroffice-0_0-0-0.0.5-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520751" comment="libwps-0_4-4-0.4.7-10.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520752" comment="myspell-af_NA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520753" comment="myspell-af_ZA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520754" comment="myspell-ar-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520755" comment="myspell-ar_AE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520756" comment="myspell-ar_BH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520757" comment="myspell-ar_DZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520758" comment="myspell-ar_EG-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520759" comment="myspell-ar_IQ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520760" comment="myspell-ar_JO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520761" comment="myspell-ar_KW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520762" comment="myspell-ar_LB-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520763" comment="myspell-ar_LY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520764" comment="myspell-ar_MA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520765" comment="myspell-ar_OM-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520766" comment="myspell-ar_QA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520767" comment="myspell-ar_SA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520768" comment="myspell-ar_SD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520769" comment="myspell-ar_SY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520770" comment="myspell-ar_TN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520771" comment="myspell-ar_YE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520772" comment="myspell-be_BY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520773" comment="myspell-bg_BG-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520774" comment="myspell-bn_BD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520775" comment="myspell-bn_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520776" comment="myspell-bs-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520777" comment="myspell-bs_BA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520778" comment="myspell-ca-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520779" comment="myspell-ca_AD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520780" comment="myspell-ca_ES-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520781" comment="myspell-ca_ES_valencia-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520782" comment="myspell-ca_FR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520783" comment="myspell-ca_IT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520784" comment="myspell-cs_CZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520785" comment="myspell-da_DK-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520786" comment="myspell-de-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520787" comment="myspell-de_AT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520788" comment="myspell-de_CH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520789" comment="myspell-de_DE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520790" comment="myspell-dictionaries-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520791" comment="myspell-el_GR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520792" comment="myspell-en-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520793" comment="myspell-en_AU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520794" comment="myspell-en_BS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520795" comment="myspell-en_BZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520796" comment="myspell-en_CA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520797" comment="myspell-en_GB-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520798" comment="myspell-en_GH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520799" comment="myspell-en_IE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520800" comment="myspell-en_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520801" comment="myspell-en_JM-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520802" comment="myspell-en_MW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520803" comment="myspell-en_NA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520804" comment="myspell-en_NZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520805" comment="myspell-en_PH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520806" comment="myspell-en_TT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520807" comment="myspell-en_US-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520808" comment="myspell-en_ZA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520809" comment="myspell-en_ZW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520810" comment="myspell-es-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520811" comment="myspell-es_AR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520812" comment="myspell-es_BO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520813" comment="myspell-es_CL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520814" comment="myspell-es_CO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520815" comment="myspell-es_CR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520816" comment="myspell-es_CU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520817" comment="myspell-es_DO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520818" comment="myspell-es_EC-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520819" comment="myspell-es_ES-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520820" comment="myspell-es_GT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520821" comment="myspell-es_HN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520822" comment="myspell-es_MX-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520823" comment="myspell-es_NI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520824" comment="myspell-es_PA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520825" comment="myspell-es_PE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520826" comment="myspell-es_PR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520827" comment="myspell-es_PY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520828" comment="myspell-es_SV-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520829" comment="myspell-es_UY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520830" comment="myspell-es_VE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520831" comment="myspell-et_EE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520832" comment="myspell-fr_BE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520833" comment="myspell-fr_CA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520834" comment="myspell-fr_CH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520835" comment="myspell-fr_FR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520836" comment="myspell-fr_LU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520837" comment="myspell-fr_MC-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520838" comment="myspell-gu_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520839" comment="myspell-he_IL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520840" comment="myspell-hi_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520841" comment="myspell-hr_HR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520842" comment="myspell-hu_HU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520843" comment="myspell-id-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520844" comment="myspell-id_ID-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520845" comment="myspell-it_IT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520846" comment="myspell-lightproof-en-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520847" comment="myspell-lightproof-hu_HU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520848" comment="myspell-lightproof-pt_BR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520849" comment="myspell-lightproof-ru_RU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520850" comment="myspell-lo_LA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520851" comment="myspell-lt_LT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520852" comment="myspell-lv_LV-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520853" comment="myspell-nb_NO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520854" comment="myspell-nl_BE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520855" comment="myspell-nl_NL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520856" comment="myspell-nn_NO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520857" comment="myspell-no-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520858" comment="myspell-pl_PL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520859" comment="myspell-pt_AO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520860" comment="myspell-pt_BR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520861" comment="myspell-pt_PT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520862" comment="myspell-ro-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520863" comment="myspell-ro_RO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520864" comment="myspell-ru_RU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520865" comment="myspell-sk_SK-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520866" comment="myspell-sl_SI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520867" comment="myspell-sr-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520868" comment="myspell-sr_CS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520869" comment="myspell-sr_Latn_CS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520870" comment="myspell-sr_Latn_RS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520871" comment="myspell-sr_RS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520872" comment="myspell-sv_FI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520873" comment="myspell-sv_SE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520874" comment="myspell-te-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520875" comment="myspell-te_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520876" comment="myspell-th_TH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520877" comment="myspell-uk_UA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520878" comment="myspell-vi-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520879" comment="myspell-vi_VN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520880" comment="myspell-zu_ZA-20180403-16.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1851-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00065.html" source="SUSE-SU"/>
    <description>
    Document Liberation Project libmwaw before 2017-04-08 has an out-of-bounds write caused by a heap-based buffer overflow related to the MsWrd1Parser::readFootnoteCorrespondance function in lib/MsWrd1Parser.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433</cve>
	<bugzilla href="https://bugzilla.suse.com/1042828">SUSE bug 1042828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174905" comment="libmwaw-0_3-3-0.3.13-7.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517712" comment="libixion-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517713" comment="libmwaw-0_3-3-0.3.11-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517714" comment="liborcus-0_12-0-0.12.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517715" comment="libreoffice-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517716" comment="libreoffice-base-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517717" comment="libreoffice-base-drivers-mysql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517718" comment="libreoffice-base-drivers-postgresql-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517719" comment="libreoffice-calc-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517720" comment="libreoffice-calc-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517721" comment="libreoffice-draw-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517722" comment="libreoffice-filters-optional-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517723" comment="libreoffice-gnome-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517724" comment="libreoffice-icon-theme-galaxy-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517725" comment="libreoffice-icon-theme-tango-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517726" comment="libreoffice-impress-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517727" comment="libreoffice-l10n-af-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517728" comment="libreoffice-l10n-ar-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517729" comment="libreoffice-l10n-ca-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517730" comment="libreoffice-l10n-cs-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517731" comment="libreoffice-l10n-da-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517732" comment="libreoffice-l10n-de-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517733" comment="libreoffice-l10n-en-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517734" comment="libreoffice-l10n-es-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517735" comment="libreoffice-l10n-fi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517736" comment="libreoffice-l10n-fr-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517737" comment="libreoffice-l10n-gu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517738" comment="libreoffice-l10n-hi-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517739" comment="libreoffice-l10n-hu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517740" comment="libreoffice-l10n-it-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517741" comment="libreoffice-l10n-ja-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517742" comment="libreoffice-l10n-ko-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517743" comment="libreoffice-l10n-nb-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517744" comment="libreoffice-l10n-nl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517745" comment="libreoffice-l10n-nn-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517746" comment="libreoffice-l10n-pl-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517747" comment="libreoffice-l10n-pt_BR-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517748" comment="libreoffice-l10n-pt_PT-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517749" comment="libreoffice-l10n-ro-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517750" comment="libreoffice-l10n-ru-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517751" comment="libreoffice-l10n-sk-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517752" comment="libreoffice-l10n-sv-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517753" comment="libreoffice-l10n-xh-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517754" comment="libreoffice-l10n-zh_CN-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517755" comment="libreoffice-l10n-zh_TW-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517756" comment="libreoffice-l10n-zu-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517757" comment="libreoffice-mailmerge-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517758" comment="libreoffice-math-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517759" comment="libreoffice-officebean-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517760" comment="libreoffice-pyuno-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517761" comment="libreoffice-writer-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517762" comment="libreoffice-writer-extensions-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517763" comment="libreofficekit-5.3.3.2-40.5.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517764" comment="libstaroffice-0_0-0-0.0.3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517765" comment="libzmf-0_0-0-0.0.1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517766" comment="myspell-af_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517767" comment="myspell-af_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517768" comment="myspell-ar-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517769" comment="myspell-ar_AE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517770" comment="myspell-ar_BH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517771" comment="myspell-ar_DZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517772" comment="myspell-ar_EG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517773" comment="myspell-ar_IQ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517774" comment="myspell-ar_JO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517775" comment="myspell-ar_KW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517776" comment="myspell-ar_LB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517777" comment="myspell-ar_LY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517778" comment="myspell-ar_MA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517779" comment="myspell-ar_OM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517780" comment="myspell-ar_QA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517781" comment="myspell-ar_SA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517782" comment="myspell-ar_SD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517783" comment="myspell-ar_SY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517784" comment="myspell-ar_TN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517785" comment="myspell-ar_YE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517786" comment="myspell-be_BY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517787" comment="myspell-bg_BG-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517788" comment="myspell-bn_BD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517789" comment="myspell-bn_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517790" comment="myspell-bs-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517791" comment="myspell-bs_BA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517792" comment="myspell-ca-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517793" comment="myspell-ca_AD-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517794" comment="myspell-ca_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517795" comment="myspell-ca_ES_valencia-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517796" comment="myspell-ca_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517797" comment="myspell-ca_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517798" comment="myspell-cs_CZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517799" comment="myspell-da_DK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517800" comment="myspell-de-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517801" comment="myspell-de_AT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517802" comment="myspell-de_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517803" comment="myspell-de_DE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517804" comment="myspell-dictionaries-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517805" comment="myspell-el_GR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517806" comment="myspell-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517807" comment="myspell-en_AU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517808" comment="myspell-en_BS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517809" comment="myspell-en_BZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517810" comment="myspell-en_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517811" comment="myspell-en_GB-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517812" comment="myspell-en_GH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517813" comment="myspell-en_IE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517814" comment="myspell-en_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517815" comment="myspell-en_JM-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517816" comment="myspell-en_MW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517817" comment="myspell-en_NA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517818" comment="myspell-en_NZ-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517819" comment="myspell-en_PH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517820" comment="myspell-en_TT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517821" comment="myspell-en_US-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517822" comment="myspell-en_ZA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517823" comment="myspell-en_ZW-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517824" comment="myspell-es-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517825" comment="myspell-es_AR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517826" comment="myspell-es_BO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517827" comment="myspell-es_CL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517828" comment="myspell-es_CO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517829" comment="myspell-es_CR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517830" comment="myspell-es_CU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517831" comment="myspell-es_DO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517832" comment="myspell-es_EC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517833" comment="myspell-es_ES-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517834" comment="myspell-es_GT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517835" comment="myspell-es_HN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517836" comment="myspell-es_MX-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517837" comment="myspell-es_NI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517838" comment="myspell-es_PA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517839" comment="myspell-es_PE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517840" comment="myspell-es_PR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517841" comment="myspell-es_PY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517842" comment="myspell-es_SV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517843" comment="myspell-es_UY-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517844" comment="myspell-es_VE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517845" comment="myspell-et_EE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517846" comment="myspell-fr_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517847" comment="myspell-fr_CA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517848" comment="myspell-fr_CH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517849" comment="myspell-fr_FR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517850" comment="myspell-fr_LU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517851" comment="myspell-fr_MC-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517852" comment="myspell-gu_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517853" comment="myspell-he_IL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517854" comment="myspell-hi_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517855" comment="myspell-hr_HR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517856" comment="myspell-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517857" comment="myspell-it_IT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517858" comment="myspell-lightproof-en-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517859" comment="myspell-lightproof-hu_HU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517860" comment="myspell-lightproof-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517861" comment="myspell-lightproof-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517862" comment="myspell-lo_LA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517863" comment="myspell-lt_LT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517864" comment="myspell-lv_LV-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517865" comment="myspell-nb_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517866" comment="myspell-nl_BE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517867" comment="myspell-nl_NL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517868" comment="myspell-nn_NO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517869" comment="myspell-no-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517870" comment="myspell-pl_PL-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517871" comment="myspell-pt_AO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517872" comment="myspell-pt_BR-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517873" comment="myspell-pt_PT-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517874" comment="myspell-ro-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517875" comment="myspell-ro_RO-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517876" comment="myspell-ru_RU-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517877" comment="myspell-sk_SK-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517878" comment="myspell-sl_SI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517879" comment="myspell-sr-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517880" comment="myspell-sr_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517881" comment="myspell-sr_Latn_CS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517882" comment="myspell-sr_Latn_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517883" comment="myspell-sr_RS-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517884" comment="myspell-sv_FI-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517885" comment="myspell-sv_SE-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517886" comment="myspell-te-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517887" comment="myspell-te_IN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517888" comment="myspell-th_TH-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517889" comment="myspell-uk_UA-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517890" comment="myspell-vi-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517891" comment="myspell-vi_VN-20170511-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517892" comment="myspell-zu_ZA-20170511-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520680" comment="boost-license1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520681" comment="gnome-documents-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520682" comment="gnome-documents-lang-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520683" comment="gnome-documents_books-common-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520684" comment="gnome-shell-search-provider-documents-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520685" comment="libboost_atomic1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520686" comment="libboost_date_time1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520687" comment="libboost_filesystem1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520688" comment="libboost_iostreams1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520689" comment="libboost_locale1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520690" comment="libboost_program_options1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520691" comment="libboost_random1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520692" comment="libboost_regex1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520693" comment="libboost_signals1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520694" comment="libboost_system1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520695" comment="libboost_thread1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520696" comment="libepubgen-0_1-1-0.1.0-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519257" comment="libixion-0_12-0-0.12.1-13.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520697" comment="libixion-0_13-0-0.13.0-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520698" comment="libmwaw-0_3-3-0.3.13-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519259" comment="liborcus-0_12-0-0.12.1-10.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520699" comment="liborcus-0_13-0-0.13.4-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520700" comment="libqxp-0_0-0-0.0.1-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520701" comment="libreoffice-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520702" comment="libreoffice-base-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520703" comment="libreoffice-base-drivers-mysql-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520704" comment="libreoffice-base-drivers-postgresql-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520705" comment="libreoffice-branding-upstream-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520706" comment="libreoffice-calc-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520707" comment="libreoffice-calc-extensions-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520708" comment="libreoffice-draw-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520709" comment="libreoffice-filters-optional-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520710" comment="libreoffice-gnome-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520711" comment="libreoffice-gtk2-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519269" comment="libreoffice-icon-theme-galaxy-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519270" comment="libreoffice-icon-theme-tango-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520712" comment="libreoffice-icon-themes-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520713" comment="libreoffice-impress-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520714" comment="libreoffice-l10n-af-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520715" comment="libreoffice-l10n-ar-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520716" comment="libreoffice-l10n-ca-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520717" comment="libreoffice-l10n-cs-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520718" comment="libreoffice-l10n-da-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520719" comment="libreoffice-l10n-de-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520720" comment="libreoffice-l10n-en-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520721" comment="libreoffice-l10n-es-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520722" comment="libreoffice-l10n-fi-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520723" comment="libreoffice-l10n-fr-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520724" comment="libreoffice-l10n-gu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520725" comment="libreoffice-l10n-hi-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520726" comment="libreoffice-l10n-hu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520727" comment="libreoffice-l10n-it-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520728" comment="libreoffice-l10n-ja-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520729" comment="libreoffice-l10n-ko-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520730" comment="libreoffice-l10n-nb-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520731" comment="libreoffice-l10n-nl-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520732" comment="libreoffice-l10n-nn-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520733" comment="libreoffice-l10n-pl-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520734" comment="libreoffice-l10n-pt_BR-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520735" comment="libreoffice-l10n-pt_PT-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520736" comment="libreoffice-l10n-ro-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520737" comment="libreoffice-l10n-ru-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520738" comment="libreoffice-l10n-sk-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520739" comment="libreoffice-l10n-sv-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520740" comment="libreoffice-l10n-xh-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520741" comment="libreoffice-l10n-zh_CN-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520742" comment="libreoffice-l10n-zh_TW-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520743" comment="libreoffice-l10n-zu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520744" comment="libreoffice-mailmerge-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520745" comment="libreoffice-math-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520746" comment="libreoffice-officebean-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520747" comment="libreoffice-pyuno-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520748" comment="libreoffice-writer-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520749" comment="libreoffice-writer-extensions-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519308" comment="libreofficekit-5.3.5.2-43.5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520750" comment="libstaroffice-0_0-0-0.0.5-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520751" comment="libwps-0_4-4-0.4.7-10.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519310" comment="libzmf-0_0-0-0.0.1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520752" comment="myspell-af_NA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520753" comment="myspell-af_ZA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520754" comment="myspell-ar-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520755" comment="myspell-ar_AE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520756" comment="myspell-ar_BH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520757" comment="myspell-ar_DZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520758" comment="myspell-ar_EG-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520759" comment="myspell-ar_IQ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520760" comment="myspell-ar_JO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520761" comment="myspell-ar_KW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520762" comment="myspell-ar_LB-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520763" comment="myspell-ar_LY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520764" comment="myspell-ar_MA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520765" comment="myspell-ar_OM-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520766" comment="myspell-ar_QA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520767" comment="myspell-ar_SA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520768" comment="myspell-ar_SD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520769" comment="myspell-ar_SY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520770" comment="myspell-ar_TN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520771" comment="myspell-ar_YE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520772" comment="myspell-be_BY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520773" comment="myspell-bg_BG-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520774" comment="myspell-bn_BD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520775" comment="myspell-bn_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520776" comment="myspell-bs-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520777" comment="myspell-bs_BA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520778" comment="myspell-ca-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520779" comment="myspell-ca_AD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520780" comment="myspell-ca_ES-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520781" comment="myspell-ca_ES_valencia-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520782" comment="myspell-ca_FR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520783" comment="myspell-ca_IT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520784" comment="myspell-cs_CZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520785" comment="myspell-da_DK-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520786" comment="myspell-de-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520787" comment="myspell-de_AT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520788" comment="myspell-de_CH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520789" comment="myspell-de_DE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520790" comment="myspell-dictionaries-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520791" comment="myspell-el_GR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520792" comment="myspell-en-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520793" comment="myspell-en_AU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520794" comment="myspell-en_BS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520795" comment="myspell-en_BZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520796" comment="myspell-en_CA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520797" comment="myspell-en_GB-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520798" comment="myspell-en_GH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520799" comment="myspell-en_IE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520800" comment="myspell-en_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520801" comment="myspell-en_JM-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520802" comment="myspell-en_MW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520803" comment="myspell-en_NA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520804" comment="myspell-en_NZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520805" comment="myspell-en_PH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520806" comment="myspell-en_TT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520807" comment="myspell-en_US-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520808" comment="myspell-en_ZA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520809" comment="myspell-en_ZW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520810" comment="myspell-es-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520811" comment="myspell-es_AR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520812" comment="myspell-es_BO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520813" comment="myspell-es_CL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520814" comment="myspell-es_CO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520815" comment="myspell-es_CR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520816" comment="myspell-es_CU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520817" comment="myspell-es_DO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520818" comment="myspell-es_EC-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520819" comment="myspell-es_ES-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520820" comment="myspell-es_GT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520821" comment="myspell-es_HN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520822" comment="myspell-es_MX-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520823" comment="myspell-es_NI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520824" comment="myspell-es_PA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520825" comment="myspell-es_PE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520826" comment="myspell-es_PR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520827" comment="myspell-es_PY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520828" comment="myspell-es_SV-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520829" comment="myspell-es_UY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520830" comment="myspell-es_VE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520831" comment="myspell-et_EE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520832" comment="myspell-fr_BE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520833" comment="myspell-fr_CA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520834" comment="myspell-fr_CH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520835" comment="myspell-fr_FR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520836" comment="myspell-fr_LU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520837" comment="myspell-fr_MC-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520838" comment="myspell-gu_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520839" comment="myspell-he_IL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520840" comment="myspell-hi_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520841" comment="myspell-hr_HR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520842" comment="myspell-hu_HU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520843" comment="myspell-id-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520844" comment="myspell-id_ID-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520845" comment="myspell-it_IT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520846" comment="myspell-lightproof-en-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520847" comment="myspell-lightproof-hu_HU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520848" comment="myspell-lightproof-pt_BR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520849" comment="myspell-lightproof-ru_RU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520850" comment="myspell-lo_LA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520851" comment="myspell-lt_LT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520852" comment="myspell-lv_LV-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520853" comment="myspell-nb_NO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520854" comment="myspell-nl_BE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520855" comment="myspell-nl_NL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520856" comment="myspell-nn_NO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520857" comment="myspell-no-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520858" comment="myspell-pl_PL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520859" comment="myspell-pt_AO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520860" comment="myspell-pt_BR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520861" comment="myspell-pt_PT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520862" comment="myspell-ro-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520863" comment="myspell-ro_RO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520864" comment="myspell-ru_RU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520865" comment="myspell-sk_SK-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520866" comment="myspell-sl_SI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520867" comment="myspell-sr-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520868" comment="myspell-sr_CS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520869" comment="myspell-sr_Latn_CS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520870" comment="myspell-sr_Latn_RS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520871" comment="myspell-sr_RS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520872" comment="myspell-sv_FI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520873" comment="myspell-sv_SE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520874" comment="myspell-te-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520875" comment="myspell-te_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520876" comment="myspell-th_TH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520877" comment="myspell-uk_UA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520878" comment="myspell-vi-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520879" comment="myspell-vi_VN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520880" comment="myspell-zu_ZA-20180403-16.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9439" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00068.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, a memory leak was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518028" comment="ImageMagick-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518029" comment="libMagick++-6_Q16-3-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518030" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518032" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9440" ref_url="https://www.suse.com/security/cve/CVE-2017-9440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00068.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, a memory leak was found in the function ReadPSDChannel in coders/psd.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9440/">CVE-2017-9440</cve>
	<bugzilla href="https://bugzilla.suse.com/1042812">SUSE bug 1042812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518028" comment="ImageMagick-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518029" comment="libMagick++-6_Q16-3-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518030" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518032" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445</cve>
	<bugzilla href="https://bugzilla.suse.com/1045290">SUSE bug 1045290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063249">SUSE bug 1063249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517924" comment="dracut-044.1-109.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517925" comment="libsystemd0-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517926" comment="libsystemd0-32bit-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517927" comment="libudev1-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517928" comment="libudev1-32bit-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517929" comment="systemd-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517930" comment="systemd-32bit-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517931" comment="systemd-bash-completion-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517932" comment="systemd-sysvinit-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517933" comment="udev-228-150.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519195" comment="libsystemd0-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519196" comment="libsystemd0-32bit-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519197" comment="libudev1-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519198" comment="libudev1-32bit-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519199" comment="systemd-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519200" comment="systemd-32bit-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519201" comment="systemd-bash-completion-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519202" comment="systemd-sysvinit-228-150.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519203" comment="udev-228-150.9.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9499" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9499" ref_url="https://www.suse.com/security/cve/CVE-2017-9499" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function SetPixelChannelAttributes, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9499/">CVE-2017-9499</cve>
	<bugzilla href="https://bugzilla.suse.com/1043291">SUSE bug 1043291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-8 Q16, an assertion failure was found in the function ResetImageProfileIterator, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00068.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function LockSemaphoreInfo, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518028" comment="ImageMagick-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518029" comment="libMagick++-6_Q16-3-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518030" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518032" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502" source="SUSE CVE"/>
    <description>
    In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given "URL" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy the path 7 bytes off, so that the end of the given path would write beyond the malloc buffer (7 bytes being the length in bytes of the ascii string "file://").
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502</cve>
	<bugzilla href="https://bugzilla.suse.com/1044243">SUSE bug 1044243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043297">SUSE bug 1043297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043312">SUSE bug 1043312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9524" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<bugzilla href="https://bugzilla.suse.com/1043808">SUSE bug 1043808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9526" ref_url="https://www.suse.com/security/cve/CVE-2017-9526" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002955.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1700-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00104.html" source="SUSE-SU"/>
    <description>
    In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-9526/">CVE-2017-9526</cve>
	<bugzilla href="https://bugzilla.suse.com/1042326">SUSE bug 1042326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043777">SUSE bug 1043777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518736" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518737" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
    <description>
    The Ins_MIRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611</cve>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The Ins_IP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9617" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.7, deeply nested DAAP data may cause stack exhaustion (uncontrolled recursion) in the dissect_daap_one_tag function in epan/dissectors/packet-daap.c in the DAAP dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518125" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518126" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518127" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518128" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518129" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518130" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9725" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9725" ref_url="https://www.suse.com/security/cve/CVE-2017-9725" source="SUSE CVE"/>
    <description>
    In all Qualcomm products with Android releases from CAF using the Linux kernel, during DMA allocation, due to wrong data type of size, allocation size gets truncated which makes allocation succeed when it should fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9725/">CVE-2017-9725</cve>
	<bugzilla href="https://bugzilla.suse.com/1057481">SUSE bug 1057481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The Ins_MDRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9766" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.7, PROFINET IO data with a high recursion depth allows remote attackers to cause a denial of service (stack exhaustion) in the dissect_IODWriteReq function in plugins/profinet/packet-dcerpc-pn-io.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518125" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518126" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518127" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518128" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518129" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518130" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in GfxState.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775</cve>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517939" comment="libpoppler44-0.24.4-14.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer overflow leading to Heap buffer overflow in JBIG2Stream.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517939" comment="libpoppler44-0.24.4-14.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9806" ref_url="https://www.suse.com/security/cve/CVE-2017-9806" source="SUSE CVE"/>
    <description>
    A vulnerability in the OpenOffice Writer DOC file parser before 4.1.4, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-9806/">CVE-2017-9806</cve>
	<bugzilla href="https://bugzilla.suse.com/1065988">SUSE bug 1065988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333957" comment="libreoffice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007144.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html" source="SUSE-SU"/>
    <description>
    cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009175342" comment="libcairo-gobject2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175343" comment="libcairo-gobject2-32bit-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175344" comment="libcairo-script-interpreter2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175345" comment="libcairo2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175346" comment="libcairo2-32bit-1.15.2-25.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520892" comment="libcairo-gobject2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520893" comment="libcairo-gobject2-32bit-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520894" comment="libcairo-script-interpreter2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520895" comment="libcairo2-1.15.2-25.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520896" comment="libcairo2-32bit-1.15.2-25.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The gs_alloc_ref_array function in psi/ialloc.c in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document. This is related to a lack of an integer overflow check in base/gsalloc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9865" ref_url="https://www.suse.com/security/cve/CVE-2017-9865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The function GfxImageColorMap::getGray in GfxState.cc in Poppler 0.54.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted PDF document, related to missing color-map validation in ImageOutputDev.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9865/">CVE-2017-9865</cve>
	<bugzilla href="https://bugzilla.suse.com/1045939">SUSE bug 1045939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9935" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108606">SUSE bug 1108606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520255" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520256" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9936" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936" source="SUSE CVE"/>
    <description>
    In LibTIFF 4.0.8, there is a memory leak in tif_jbig.c. A crafted TIFF document can lead to a memory leak resulting in a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936</cve>
	<bugzilla href="https://bugzilla.suse.com/1046073">SUSE bug 1046073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9954" ref_url="https://www.suse.com/security/cve/CVE-2017-9954" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The getvalue function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted tekhex file, as demonstrated by mishandling within the nm program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-9954/">CVE-2017-9954</cve>
	<bugzilla href="https://bugzilla.suse.com/1052061">SUSE bug 1052061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9955" ref_url="https://www.suse.com/security/cve/CVE-2017-9955" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The get_build_id function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file in which a certain size field is larger than a corresponding data field, as demonstrated by mishandling within the objdump program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9955/">CVE-2017-9955</cve>
	<bugzilla href="https://bugzilla.suse.com/1046094">SUSE bug 1046094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9985" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9985" ref_url="https://www.suse.com/security/cve/CVE-2017-9985" source="SUSE CVE"/>
    <description>
    The snd_msndmidi_input_read function in sound/isa/msnd/msnd_midi.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-04"/>
	<updated date="2022-05-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9985/">CVE-2017-9985</cve>
	<bugzilla href="https://bugzilla.suse.com/1046601">SUSE bug 1046601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0202" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
    <description>
    clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519046" comment="clamav-0.99.4-33.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103091">SUSE bug 1103091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103092">SUSE bug 1103092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0361" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103091">SUSE bug 1103091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103092">SUSE bug 1103092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00092.html" source="SUSE-SU"/>
    <description>
    GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123797">SUSE bug 1123797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159418">SUSE bug 1159418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520989" comment="wget-1.14-21.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2452-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00070.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519982" comment="libgcrypt20-1.6.1-16.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519983" comment="libgcrypt20-32bit-1.6.1-16.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333972" comment="xorg-x11-libs is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519982" comment="libgcrypt20-1.6.1-16.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519983" comment="libgcrypt20-32bit-1.6.1-16.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0500" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0500" ref_url="https://www.suse.com/security/cve/CVE-2018-0500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00065.html" source="SUSE-SU"/>
    <description>
    Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0500/">CVE-2018-0500</cve>
	<bugzilla href="https://bugzilla.suse.com/1099793">SUSE bug 1099793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1887-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2855-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00009.html" source="SUSE-SU"/>
    <description>
    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<bugzilla href="https://bugzilla.suse.com/1077628">SUSE bug 1077628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099502">SUSE bug 1099502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106692">SUSE bug 1106692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110163">SUSE bug 1110163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519760" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520047" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520048" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519761" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519762" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519763" comment="openssl-1.0.2j-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0733" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0733" ref_url="https://www.suse.com/security/cve/CVE-2018-0733" source="SUSE CVE"/>
    <description>
    Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security claims of the scheme. The module can only be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets are affected. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-0733/">CVE-2018-0733</cve>
	<bugzilla href="https://bugzilla.suse.com/1087106">SUSE bug 1087106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520373" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520405" comment="libopenssl0_9_8-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520406" comment="libopenssl0_9_8-32bit-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520374" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520375" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520376" comment="openssl-1.0.2j-60.46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521787" comment="libopenssl-1_0_0-devel-1.0.2p-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520405" comment="libopenssl0_9_8-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520406" comment="libopenssl0_9_8-32bit-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521788" comment="libopenssl1_0_0-1.0.2p-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521789" comment="libopenssl1_0_0-32bit-1.0.2p-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521785" comment="libopenssl1_1-1.1.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521786" comment="libopenssl1_1-32bit-1.1.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521790" comment="openssl-1_0_0-1.0.2p-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00043.html" source="SUSE-SU"/>
    <description>
    The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113651">SUSE bug 1113651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521785" comment="libopenssl1_1-1.1.1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521786" comment="libopenssl1_1-32bit-1.1.1-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2928-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089041">SUSE bug 1089041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089044">SUSE bug 1089044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089045">SUSE bug 1089045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123780">SUSE bug 1123780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520119" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520047" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520048" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520120" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520121" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520122" comment="openssl-1.0.2j-60.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0975-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00023.html" source="SUSE-SU"/>
    <description>
    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512612" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-2.18 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519160" comment="libopenssl-devel-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519161" comment="libopenssl1_0_0-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519162" comment="libopenssl1_0_0-32bit-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519163" comment="openssl-1.0.2j-60.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519160" comment="libopenssl-devel-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520047" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520048" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519161" comment="libopenssl1_0_0-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519162" comment="libopenssl1_0_0-32bit-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519163" comment="openssl-1.0.2j-60.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0886" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00022.html" source="SUSE-SU"/>
    <description>
    The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886</cve>
	<bugzilla href="https://bugzilla.suse.com/1085416">SUSE bug 1085416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087240">SUSE bug 1087240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099047">SUSE bug 1099047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518942" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518943" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518944" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518945" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518947" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518948" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518949" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005" source="SUSE CVE"/>
    <description>
    libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005</cve>
	<bugzilla href="https://bugzilla.suse.com/1076360">SUSE bug 1076360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0236-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00101.html" source="SUSE-SU"/>
    <description>
    libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145903">SUSE bug 1145903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185551">SUSE bug 1185551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192797">SUSE bug 1192797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518782" comment="curl-7.37.0-37.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518783" comment="libcurl4-7.37.0-37.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518784" comment="libcurl4-32bit-7.37.0-37.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<bugzilla href="https://bugzilla.suse.com/1079384">SUSE bug 1079384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000028" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000028" ref_url="https://www.suse.com/security/cve/CVE-2018-1000028" source="SUSE CVE"/>
    <description>
    Linux kernel version after commit bdcf0a423ea1 - 4.15-rc4+, 4.14.8+, 4.9.76+, 4.4.111+ contains a Incorrect Access Control vulnerability in NFS server (nfsd) that can result in remote users reading or writing files they should not be able to via NFS. This attack appear to be exploitable via NFS server must export a filesystem with the "rootsquash" options enabled. This vulnerability appears to have been fixed in after commit 1995266727fa.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000028/">CVE-2018-1000028</cve>
	<bugzilla href="https://bugzilla.suse.com/1078287">SUSE bug 1078287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00098.html" source="SUSE-SU"/>
    <description>
    Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3-&gt;Malloc-&gt;Thread1-&gt;Free's-&gt;Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<bugzilla href="https://bugzilla.suse.com/1079300">SUSE bug 1079300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520990" comment="libpython2_7-1_0-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520991" comment="libpython2_7-1_0-32bit-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520992" comment="python-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520993" comment="python-base-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520994" comment="python-curses-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520995" comment="python-devel-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520996" comment="python-tk-2.7.13-28.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520997" comment="python-xml-2.7.13-28.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000031" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000031" ref_url="https://www.suse.com/security/cve/CVE-2018-1000031" source="SUSE CVE"/>
    <description>
    A heap-based buffer overflow exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service or to possibly achieve code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000031/">CVE-2018-1000031</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080075">SUSE bug 1080075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338997" comment="unzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000032" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000032" ref_url="https://www.suse.com/security/cve/CVE-2018-1000032" source="SUSE CVE"/>
    <description>
    A heap-based buffer overflow exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service or to possibly achieve code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000032/">CVE-2018-1000032</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080076">SUSE bug 1080076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338997" comment="unzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000033" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000033" ref_url="https://www.suse.com/security/cve/CVE-2018-1000033" source="SUSE CVE"/>
    <description>
    An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service and read sensitive memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-1000033/">CVE-2018-1000033</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080077">SUSE bug 1080077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338997" comment="unzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000034" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000034" ref_url="https://www.suse.com/security/cve/CVE-2018-1000034" source="SUSE CVE"/>
    <description>
    An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service and read sensitive memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-1000034/">CVE-2018-1000034</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080079">SUSE bug 1080079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338997" comment="unzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow exists in Info-Zip UnZip version &lt;= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-05"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149684">SUSE bug 1149684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196768">SUSE bug 1196768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520123" comment="unzip-6.00-33.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000041" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000041" ref_url="https://www.suse.com/security/cve/CVE-2018-1000041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00077.html" source="SUSE-SU"/>
    <description>
    GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000041/">CVE-2018-1000041</cve>
	<bugzilla href="https://bugzilla.suse.com/1083232">SUSE bug 1083232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009175785" comment="gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175787" comment="librsvg-2-2-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175788" comment="librsvg-2-2-32bit-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175789" comment="rsvg-view-2.40.20-5.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520906" comment="gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520907" comment="librsvg-2-2-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520908" comment="librsvg-2-2-32bit-2.40.20-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520909" comment="rsvg-view-2.40.20-5.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. This attack appear to be exploitable via the victim must install a malicious gem. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000085" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519046" comment="clamav-0.99.4-33.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000097" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000097" ref_url="https://www.suse.com/security/cve/CVE-2018-1000097" source="SUSE CVE"/>
    <description>
    Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000097/">CVE-2018-1000097</cve>
	<bugzilla href="https://bugzilla.suse.com/1085004">SUSE bug 1085004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334079" comment="sharutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004533.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0794-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00084.html" source="SUSE-SU"/>
    <description>
    A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519030" comment="curl-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519031" comment="libcurl4-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519032" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0794-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00084.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085215">SUSE bug 1085215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519030" comment="curl-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519031" comment="libcurl4-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519032" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0794-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00084.html" source="SUSE-SU"/>
    <description>
    A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519030" comment="curl-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519031" comment="libcurl4-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519032" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00004.html" source="SUSE-SU"/>
    <description>
    GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093615">SUSE bug 1093615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142513">SUSE bug 1142513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175223" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520881" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000200" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000200" ref_url="https://www.suse.com/security/cve/CVE-2018-1000200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper's unmap_page_range() since the vma's VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000200/">CVE-2018-1000200</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090150">SUSE bug 1090150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000204" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000221" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000221" ref_url="https://www.suse.com/security/cve/CVE-2018-1000221" source="SUSE CVE"/>
    <description>
    pkgconf version 1.5.0 to 1.5.2 contains a Buffer Overflow vulnerability in dequote() that can result in dequote() function returns 1-byte allocation if initial length is 0, leading to buffer overflow. This attack appear to be exploitable via specially crafted .pc file. This vulnerability appears to have been fixed in 1.5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-1000221/">CVE-2018-1000221</cve>
	<bugzilla href="https://bugzilla.suse.com/1105438">SUSE bug 1105438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338998" comment="pkg-config is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00084.html" source="SUSE-SU"/>
    <description>
    Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222</cve>
	<bugzilla href="https://bugzilla.suse.com/1105434">SUSE bug 1105434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520083" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520084" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000223" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004652.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00005.html" source="SUSE-SU"/>
    <description>
    soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223</cve>
	<bugzilla href="https://bugzilla.suse.com/1103676">SUSE bug 1103676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512228" comment="libSoundTouch0-1.7.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512229" comment="libSoundTouch0-32bit-1.7.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512230" comment="soundtouch-1.7.1-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520148" comment="libSoundTouch0-1.7.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520149" comment="libSoundTouch0-32bit-1.7.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520150" comment="soundtouch-1.7.1-5.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00015.html" source="SUSE-SU"/>
    <description>
    curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerability appears to have been fixed in curl &lt; 7.54.1 and curl &gt;= 7.60.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300</cve>
	<bugzilla href="https://bugzilla.suse.com/1092094">SUSE bug 1092094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00015.html" source="SUSE-SU"/>
    <description>
    curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl &lt; 7.20.0 and curl &gt;= 7.60.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520965" comment="curl-7.37.0-37.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520966" comment="libcurl4-7.37.0-37.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520967" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1372-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1498-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" source="SUSE-SU"/>
    <description>
    GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521215" comment="libtasn1-4.9-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521216" comment="libtasn1-6-4.9-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521217" comment="libtasn1-6-32bit-4.9-3.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520304" comment="python-devel-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520304" comment="python-devel-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000807" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807</cve>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521791" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000808" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808</cve>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521791" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000845" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00034.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultID: CVE-2017-6519.  Reason: This candidate is a duplicate of CVE-2017-6519.  Notes: All CVE users should reference CVE-2017-6519 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521569" comment="avahi-0.6.32-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521570" comment="avahi-lang-0.6.32-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521571" comment="libavahi-client3-0.6.32-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521572" comment="libavahi-client3-32bit-0.6.32-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521573" comment="libavahi-common3-0.6.32-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521574" comment="libavahi-common3-32bit-0.6.32-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521575" comment="libavahi-core7-0.6.32-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521576" comment="libavahi-glib1-0.6.32-32.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521577" comment="libavahi-glib1-32bit-0.6.32-32.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521578" comment="libavahi-gobject0-0.6.32-32.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521579" comment="libavahi-ui-gtk3-0-0.6.32-32.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521580" comment="libavahi-ui0-0.6.32-32.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521581" comment="libdns_sd-0.6.32-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521582" comment="libdns_sd-32bit-0.6.32-32.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00022.html" source="SUSE-SU"/>
    <description>
    FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852</cve>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120507">SUSE bug 1120507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000858" ref_url="https://www.suse.com/security/cve/CVE-2018-1000858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00009.html" source="SUSE-SU"/>
    <description>
    GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000858/">CVE-2018-1000858</cve>
	<bugzilla href="https://bugzilla.suse.com/1120346">SUSE bug 1120346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333951" comment="gpg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000877" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar-&gt;lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877</cve>
	<bugzilla href="https://bugzilla.suse.com/1120653">SUSE bug 1120653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000878" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878</cve>
	<bugzilla href="https://bugzilla.suse.com/1120654">SUSE bug 1120654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000879" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000879" ref_url="https://www.suse.com/security/cve/CVE-2018-1000879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000879/">CVE-2018-1000879</cve>
	<bugzilla href="https://bugzilla.suse.com/1120656">SUSE bug 1120656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334081" comment="libarchive is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10087" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10111" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10111" ref_url="https://www.suse.com/security/cve/CVE-2018-10111" source="SUSE CVE"/>
    <description>
    An issue was discovered in GEGL through 0.3.32. The render_rectangle function in process/gegl-processor.c has unbounded memory allocation, leading to a denial of service (application crash) upon allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-10111/">CVE-2018-10111</cve>
	<bugzilla href="https://bugzilla.suse.com/1089730">SUSE bug 1089730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334229" comment="gegl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10115" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10115" ref_url="https://www.suse.com/security/cve/CVE-2018-10115" source="SUSE CVE"/>
    <description>
    Incorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10115/">CVE-2018-10115</cve>
	<bugzilla href="https://bugzilla.suse.com/1091758">SUSE bug 1091758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334011" comment="p7zip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10119" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10119" ref_url="https://www.suse.com/security/cve/CVE-2018-10119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00078.html" source="SUSE-SU"/>
    <description>
    sot/source/sdstor/stgstrms.cxx in LibreOffice before 5.4.5.1 and 6.x before 6.0.1.1 uses an incorrect integer data type in the StgSmallStrm class, which allows remote attackers to cause a denial of service (use-after-free with write access) or possibly have unspecified other impact via a crafted document that uses the structured storage ole2 wrapper file format.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10119/">CVE-2018-10119</cve>
	<bugzilla href="https://bugzilla.suse.com/1089705">SUSE bug 1089705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520910" comment="libreoffice-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520911" comment="libreoffice-base-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520912" comment="libreoffice-base-drivers-mysql-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520913" comment="libreoffice-base-drivers-postgresql-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520914" comment="libreoffice-branding-upstream-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520915" comment="libreoffice-calc-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520916" comment="libreoffice-calc-extensions-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520917" comment="libreoffice-draw-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520918" comment="libreoffice-filters-optional-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520919" comment="libreoffice-gnome-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520920" comment="libreoffice-gtk2-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520921" comment="libreoffice-icon-themes-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520922" comment="libreoffice-impress-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520923" comment="libreoffice-l10n-af-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520924" comment="libreoffice-l10n-ar-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520925" comment="libreoffice-l10n-ca-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520926" comment="libreoffice-l10n-cs-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520927" comment="libreoffice-l10n-da-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520928" comment="libreoffice-l10n-de-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520929" comment="libreoffice-l10n-en-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520930" comment="libreoffice-l10n-es-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520931" comment="libreoffice-l10n-fi-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520932" comment="libreoffice-l10n-fr-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520933" comment="libreoffice-l10n-gu-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520934" comment="libreoffice-l10n-hi-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520935" comment="libreoffice-l10n-hu-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520936" comment="libreoffice-l10n-it-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520937" comment="libreoffice-l10n-ja-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520938" comment="libreoffice-l10n-ko-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520939" comment="libreoffice-l10n-nb-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520940" comment="libreoffice-l10n-nl-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520941" comment="libreoffice-l10n-nn-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520942" comment="libreoffice-l10n-pl-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520943" comment="libreoffice-l10n-pt_BR-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520944" comment="libreoffice-l10n-pt_PT-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520945" comment="libreoffice-l10n-ro-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520946" comment="libreoffice-l10n-ru-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520947" comment="libreoffice-l10n-sk-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520948" comment="libreoffice-l10n-sv-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520949" comment="libreoffice-l10n-xh-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520950" comment="libreoffice-l10n-zh_CN-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520951" comment="libreoffice-l10n-zh_TW-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520952" comment="libreoffice-l10n-zu-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520953" comment="libreoffice-mailmerge-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520954" comment="libreoffice-math-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520955" comment="libreoffice-officebean-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520956" comment="libreoffice-pyuno-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520957" comment="libreoffice-writer-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520958" comment="libreoffice-writer-extensions-6.0.4.2-43.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10120" ref_url="https://www.suse.com/security/cve/CVE-2018-10120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00078.html" source="SUSE-SU"/>
    <description>
    The SwCTBWrapper::Read function in sw/source/filter/ww8/ww8toolbar.cxx in LibreOffice before 5.4.6.1 and 6.x before 6.0.2.1 does not validate a customizations index, which allows remote attackers to cause a denial of service (heap-based buffer overflow with write access) or possibly have unspecified other impact via a crafted document that contains a certain Microsoft Word record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10120/">CVE-2018-10120</cve>
	<bugzilla href="https://bugzilla.suse.com/1089706">SUSE bug 1089706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520910" comment="libreoffice-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520911" comment="libreoffice-base-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520912" comment="libreoffice-base-drivers-mysql-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520913" comment="libreoffice-base-drivers-postgresql-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520914" comment="libreoffice-branding-upstream-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520915" comment="libreoffice-calc-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520916" comment="libreoffice-calc-extensions-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520917" comment="libreoffice-draw-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520918" comment="libreoffice-filters-optional-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520919" comment="libreoffice-gnome-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520920" comment="libreoffice-gtk2-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520921" comment="libreoffice-icon-themes-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520922" comment="libreoffice-impress-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520923" comment="libreoffice-l10n-af-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520924" comment="libreoffice-l10n-ar-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520925" comment="libreoffice-l10n-ca-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520926" comment="libreoffice-l10n-cs-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520927" comment="libreoffice-l10n-da-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520928" comment="libreoffice-l10n-de-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520929" comment="libreoffice-l10n-en-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520930" comment="libreoffice-l10n-es-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520931" comment="libreoffice-l10n-fi-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520932" comment="libreoffice-l10n-fr-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520933" comment="libreoffice-l10n-gu-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520934" comment="libreoffice-l10n-hi-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520935" comment="libreoffice-l10n-hu-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520936" comment="libreoffice-l10n-it-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520937" comment="libreoffice-l10n-ja-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520938" comment="libreoffice-l10n-ko-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520939" comment="libreoffice-l10n-nb-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520940" comment="libreoffice-l10n-nl-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520941" comment="libreoffice-l10n-nn-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520942" comment="libreoffice-l10n-pl-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520943" comment="libreoffice-l10n-pt_BR-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520944" comment="libreoffice-l10n-pt_PT-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520945" comment="libreoffice-l10n-ro-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520946" comment="libreoffice-l10n-ru-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520947" comment="libreoffice-l10n-sk-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520948" comment="libreoffice-l10n-sv-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520949" comment="libreoffice-l10n-xh-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520950" comment="libreoffice-l10n-zh_CN-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520951" comment="libreoffice-l10n-zh_TW-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520952" comment="libreoffice-l10n-zu-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520953" comment="libreoffice-mailmerge-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520954" comment="libreoffice-math-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520955" comment="libreoffice-officebean-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520956" comment="libreoffice-pyuno-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520957" comment="libreoffice-writer-6.0.4.2-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520958" comment="libreoffice-writer-extensions-6.0.4.2-43.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10126" ref_url="https://www.suse.com/security/cve/CVE-2018-10126" source="SUSE CVE"/>
    <description>
    LibTIFF 4.0.9 has a NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10126/">CVE-2018-10126</cve>
	<bugzilla href="https://bugzilla.suse.com/1090496">SUSE bug 1090496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10177" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-28, there is an infinite loop in the ReadOneMNGImage function of the coders/png.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted mng file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00010.html" source="SUSE-SU"/>
    <description>
    The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520968" comment="ghostscript-9.15-23.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520969" comment="ghostscript-x11-9.15-23.10.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10195" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html" source="SUSE-SU"/>
    <description>
    lrzsz before version 0.12.21~rc can leak information to the receiving side due to an incorrect length check in the function zsdata that causes a size_t to wrap around.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195</cve>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149678">SUSE bug 1149678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174874" comment="rzsz-0.12.21~rc-1001.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520674" comment="rzsz-0.12.21~rc-1001.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090717">SUSE bug 1090717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html" source="SUSE-SU"/>
    <description>
    The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360</cve>
	<bugzilla href="https://bugzilla.suse.com/1096974">SUSE bug 1096974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521750" comment="file-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521751" comment="file-magic-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521752" comment="libmagic1-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521753" comment="libmagic1-32bit-5.22-10.12.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004243.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1953-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00015.html" source="SUSE-SU"/>
    <description>
    mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519654" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519655" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519656" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519657" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519658" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519659" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00084.html" source="SUSE-SU"/>
    <description>
    bark_noise_hybridmp in psy.c in Xiph.Org libvorbis 1.3.6 has a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520959" comment="libvorbis0-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520960" comment="libvorbis0-32bit-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520961" comment="libvorbisenc2-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520962" comment="libvorbisenc2-32bit-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520963" comment="libvorbisfile3-1.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520964" comment="libvorbisfile3-32bit-1.3.3-10.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520889" comment="xen-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520890" comment="xen-libs-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520891" comment="xen-libs-32bit-4.9.2_04-3.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520889" comment="xen-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520890" comment="xen-libs-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520891" comment="xen-libs-32bit-4.9.2_04-3.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0320-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00118.html" source="SUSE-SU"/>
    <description>
    In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like this may lead to denial of service, until mount points are unmounted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049</cve>
	<bugzilla href="https://bugzilla.suse.com/1076308">SUSE bug 1076308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140475">SUSE bug 1140475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518810" comment="libsystemd0-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518811" comment="libsystemd0-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518812" comment="libudev1-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518813" comment="libudev1-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518814" comment="systemd-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518815" comment="systemd-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518816" comment="systemd-bash-completion-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518817" comment="systemd-sysvinit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518818" comment="udev-228-150.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0774-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180774-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0801-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00091.html" source="SUSE-SU"/>
    <description>
    All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519072" comment="libdcerpc-binding0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519073" comment="libdcerpc-binding0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519074" comment="libdcerpc0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519075" comment="libdcerpc0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519076" comment="libndr-krb5pac0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519077" comment="libndr-krb5pac0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519078" comment="libndr-nbt0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519079" comment="libndr-nbt0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519080" comment="libndr-standard0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519081" comment="libndr-standard0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519082" comment="libndr0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519083" comment="libndr0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519084" comment="libnetapi0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519085" comment="libnetapi0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519086" comment="libsamba-credentials0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519087" comment="libsamba-credentials0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519088" comment="libsamba-errors0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519089" comment="libsamba-errors0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519090" comment="libsamba-hostconfig0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519091" comment="libsamba-hostconfig0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519092" comment="libsamba-passdb0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519093" comment="libsamba-passdb0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519094" comment="libsamba-util0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519095" comment="libsamba-util0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519096" comment="libsamdb0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519097" comment="libsamdb0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519098" comment="libsmbclient0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519099" comment="libsmbclient0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519100" comment="libsmbconf0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519101" comment="libsmbconf0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519102" comment="libsmbldap0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519103" comment="libsmbldap0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519104" comment="libtevent-util0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519105" comment="libtevent-util0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519106" comment="libwbclient0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519107" comment="libwbclient0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519108" comment="samba-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519109" comment="samba-client-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519110" comment="samba-client-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519111" comment="samba-doc-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519112" comment="samba-libs-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519113" comment="samba-libs-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519114" comment="samba-winbind-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519115" comment="samba-winbind-32bit-4.4.2-38.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520529" comment="libdcerpc-binding0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520530" comment="libdcerpc-binding0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520531" comment="libdcerpc0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520532" comment="libdcerpc0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520533" comment="libndr-krb5pac0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520534" comment="libndr-krb5pac0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520535" comment="libndr-nbt0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520536" comment="libndr-nbt0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520537" comment="libndr-standard0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520538" comment="libndr-standard0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520539" comment="libndr0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520540" comment="libndr0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520541" comment="libnetapi0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520542" comment="libnetapi0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520543" comment="libsamba-credentials0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520544" comment="libsamba-credentials0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520545" comment="libsamba-errors0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520546" comment="libsamba-errors0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520547" comment="libsamba-hostconfig0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520548" comment="libsamba-hostconfig0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520549" comment="libsamba-passdb0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520550" comment="libsamba-passdb0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520551" comment="libsamba-util0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520552" comment="libsamba-util0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520553" comment="libsamdb0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520554" comment="libsamdb0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520555" comment="libsmbclient0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520556" comment="libsmbclient0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520557" comment="libsmbconf0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520558" comment="libsmbconf0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520559" comment="libsmbldap0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520560" comment="libsmbldap0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520561" comment="libtalloc2-2.1.10-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520562" comment="libtalloc2-32bit-2.1.10-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520563" comment="libtevent-util0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520564" comment="libtevent-util0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520565" comment="libtevent0-0.9.34-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520566" comment="libtevent0-32bit-0.9.34-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520567" comment="libwbclient0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520568" comment="libwbclient0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520569" comment="python-talloc-2.1.10-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520570" comment="python-talloc-32bit-2.1.10-3.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520571" comment="samba-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520572" comment="samba-client-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520573" comment="samba-client-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520574" comment="samba-doc-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520575" comment="samba-libs-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520576" comment="samba-libs-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520577" comment="samba-winbind-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520578" comment="samba-winbind-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10528" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10528" ref_url="https://www.suse.com/security/cve/CVE-2018-10528" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10528/">CVE-2018-10528</cve>
	<bugzilla href="https://bugzilla.suse.com/1091345">SUSE bug 1091345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10529" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10529" ref_url="https://www.suse.com/security/cve/CVE-2018-10529" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibRaw 0.18.9. There is an out-of-bounds read affecting the X3F property table list implementation in libraw_x3f.cpp and libraw_cxx.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10529/">CVE-2018-10529</cve>
	<bugzilla href="https://bugzilla.suse.com/1091346">SUSE bug 1091346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1053" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0523-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00044.html" source="SUSE-SU"/>
    <description>
    In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518954" comment="libecpg6-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518955" comment="libpq5-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518956" comment="libpq5-32bit-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518957" comment="postgresql96-9.6.7-3.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518954" comment="libecpg6-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518955" comment="libpq5-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518956" comment="libpq5-32bit-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519011" comment="postgresql94-9.4.16-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518957" comment="postgresql96-9.6.7-3.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10536" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10536" ref_url="https://www.suse.com/security/cve/CVE-2018-10536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10536/">CVE-2018-10536</cve>
	<bugzilla href="https://bugzilla.suse.com/1091344">SUSE bug 1091344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10537" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10537" ref_url="https://www.suse.com/security/cve/CVE-2018-10537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10537/">CVE-2018-10537</cve>
	<bugzilla href="https://bugzilla.suse.com/1091343">SUSE bug 1091343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10538" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10538" ref_url="https://www.suse.com/security/cve/CVE-2018-10538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10538/">CVE-2018-10538</cve>
	<bugzilla href="https://bugzilla.suse.com/1091342">SUSE bug 1091342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10539" ref_url="https://www.suse.com/security/cve/CVE-2018-10539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10539/">CVE-2018-10539</cve>
	<bugzilla href="https://bugzilla.suse.com/1091341">SUSE bug 1091341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10540" ref_url="https://www.suse.com/security/cve/CVE-2018-10540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10540/">CVE-2018-10540</cve>
	<bugzilla href="https://bugzilla.suse.com/1091340">SUSE bug 1091340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1055" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1055" ref_url="https://www.suse.com/security/cve/CVE-2018-1055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003960.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2018-6871.  Reason: This candidate is a reservation duplicate of CVE-2018-6871.  Notes: All CVE users should reference CVE-2018-6871 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1055/">CVE-2018-1055</cve>
	<bugzilla href="https://bugzilla.suse.com/1080249">SUSE bug 1080249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520680" comment="boost-license1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520681" comment="gnome-documents-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520682" comment="gnome-documents-lang-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520683" comment="gnome-documents_books-common-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520684" comment="gnome-shell-search-provider-documents-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520685" comment="libboost_atomic1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520686" comment="libboost_date_time1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520687" comment="libboost_filesystem1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520688" comment="libboost_iostreams1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520689" comment="libboost_locale1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520690" comment="libboost_program_options1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520691" comment="libboost_random1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520692" comment="libboost_regex1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520693" comment="libboost_signals1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520694" comment="libboost_system1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520695" comment="libboost_thread1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520696" comment="libepubgen-0_1-1-0.1.0-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520697" comment="libixion-0_13-0-0.13.0-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520698" comment="libmwaw-0_3-3-0.3.13-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520699" comment="liborcus-0_13-0-0.13.4-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520700" comment="libqxp-0_0-0-0.0.1-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520701" comment="libreoffice-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520702" comment="libreoffice-base-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520703" comment="libreoffice-base-drivers-mysql-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520704" comment="libreoffice-base-drivers-postgresql-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520705" comment="libreoffice-branding-upstream-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520706" comment="libreoffice-calc-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520707" comment="libreoffice-calc-extensions-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520708" comment="libreoffice-draw-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520709" comment="libreoffice-filters-optional-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520710" comment="libreoffice-gnome-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520711" comment="libreoffice-gtk2-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520712" comment="libreoffice-icon-themes-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520713" comment="libreoffice-impress-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520714" comment="libreoffice-l10n-af-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520715" comment="libreoffice-l10n-ar-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520716" comment="libreoffice-l10n-ca-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520717" comment="libreoffice-l10n-cs-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520718" comment="libreoffice-l10n-da-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520719" comment="libreoffice-l10n-de-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520720" comment="libreoffice-l10n-en-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520721" comment="libreoffice-l10n-es-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520722" comment="libreoffice-l10n-fi-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520723" comment="libreoffice-l10n-fr-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520724" comment="libreoffice-l10n-gu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520725" comment="libreoffice-l10n-hi-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520726" comment="libreoffice-l10n-hu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520727" comment="libreoffice-l10n-it-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520728" comment="libreoffice-l10n-ja-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520729" comment="libreoffice-l10n-ko-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520730" comment="libreoffice-l10n-nb-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520731" comment="libreoffice-l10n-nl-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520732" comment="libreoffice-l10n-nn-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520733" comment="libreoffice-l10n-pl-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520734" comment="libreoffice-l10n-pt_BR-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520735" comment="libreoffice-l10n-pt_PT-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520736" comment="libreoffice-l10n-ro-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520737" comment="libreoffice-l10n-ru-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520738" comment="libreoffice-l10n-sk-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520739" comment="libreoffice-l10n-sv-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520740" comment="libreoffice-l10n-xh-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520741" comment="libreoffice-l10n-zh_CN-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520742" comment="libreoffice-l10n-zh_TW-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520743" comment="libreoffice-l10n-zu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520744" comment="libreoffice-mailmerge-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520745" comment="libreoffice-math-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520746" comment="libreoffice-officebean-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520747" comment="libreoffice-pyuno-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520748" comment="libreoffice-writer-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520749" comment="libreoffice-writer-extensions-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520750" comment="libstaroffice-0_0-0-0.0.5-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520751" comment="libwps-0_4-4-0.4.7-10.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520752" comment="myspell-af_NA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520753" comment="myspell-af_ZA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520754" comment="myspell-ar-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520755" comment="myspell-ar_AE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520756" comment="myspell-ar_BH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520757" comment="myspell-ar_DZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520758" comment="myspell-ar_EG-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520759" comment="myspell-ar_IQ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520760" comment="myspell-ar_JO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520761" comment="myspell-ar_KW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520762" comment="myspell-ar_LB-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520763" comment="myspell-ar_LY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520764" comment="myspell-ar_MA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520765" comment="myspell-ar_OM-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520766" comment="myspell-ar_QA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520767" comment="myspell-ar_SA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520768" comment="myspell-ar_SD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520769" comment="myspell-ar_SY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520770" comment="myspell-ar_TN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520771" comment="myspell-ar_YE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520772" comment="myspell-be_BY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520773" comment="myspell-bg_BG-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520774" comment="myspell-bn_BD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520775" comment="myspell-bn_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520776" comment="myspell-bs-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520777" comment="myspell-bs_BA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520778" comment="myspell-ca-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520779" comment="myspell-ca_AD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520780" comment="myspell-ca_ES-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520781" comment="myspell-ca_ES_valencia-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520782" comment="myspell-ca_FR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520783" comment="myspell-ca_IT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520784" comment="myspell-cs_CZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520785" comment="myspell-da_DK-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520786" comment="myspell-de-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520787" comment="myspell-de_AT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520788" comment="myspell-de_CH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520789" comment="myspell-de_DE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520790" comment="myspell-dictionaries-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520791" comment="myspell-el_GR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520792" comment="myspell-en-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520793" comment="myspell-en_AU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520794" comment="myspell-en_BS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520795" comment="myspell-en_BZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520796" comment="myspell-en_CA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520797" comment="myspell-en_GB-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520798" comment="myspell-en_GH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520799" comment="myspell-en_IE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520800" comment="myspell-en_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520801" comment="myspell-en_JM-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520802" comment="myspell-en_MW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520803" comment="myspell-en_NA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520804" comment="myspell-en_NZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520805" comment="myspell-en_PH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520806" comment="myspell-en_TT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520807" comment="myspell-en_US-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520808" comment="myspell-en_ZA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520809" comment="myspell-en_ZW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520810" comment="myspell-es-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520811" comment="myspell-es_AR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520812" comment="myspell-es_BO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520813" comment="myspell-es_CL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520814" comment="myspell-es_CO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520815" comment="myspell-es_CR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520816" comment="myspell-es_CU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520817" comment="myspell-es_DO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520818" comment="myspell-es_EC-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520819" comment="myspell-es_ES-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520820" comment="myspell-es_GT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520821" comment="myspell-es_HN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520822" comment="myspell-es_MX-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520823" comment="myspell-es_NI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520824" comment="myspell-es_PA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520825" comment="myspell-es_PE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520826" comment="myspell-es_PR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520827" comment="myspell-es_PY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520828" comment="myspell-es_SV-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520829" comment="myspell-es_UY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520830" comment="myspell-es_VE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520831" comment="myspell-et_EE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520832" comment="myspell-fr_BE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520833" comment="myspell-fr_CA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520834" comment="myspell-fr_CH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520835" comment="myspell-fr_FR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520836" comment="myspell-fr_LU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520837" comment="myspell-fr_MC-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520838" comment="myspell-gu_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520839" comment="myspell-he_IL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520840" comment="myspell-hi_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520841" comment="myspell-hr_HR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520842" comment="myspell-hu_HU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520843" comment="myspell-id-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520844" comment="myspell-id_ID-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520845" comment="myspell-it_IT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520846" comment="myspell-lightproof-en-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520847" comment="myspell-lightproof-hu_HU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520848" comment="myspell-lightproof-pt_BR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520849" comment="myspell-lightproof-ru_RU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520850" comment="myspell-lo_LA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520851" comment="myspell-lt_LT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520852" comment="myspell-lv_LV-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520853" comment="myspell-nb_NO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520854" comment="myspell-nl_BE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520855" comment="myspell-nl_NL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520856" comment="myspell-nn_NO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520857" comment="myspell-no-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520858" comment="myspell-pl_PL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520859" comment="myspell-pt_AO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520860" comment="myspell-pt_BR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520861" comment="myspell-pt_PT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520862" comment="myspell-ro-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520863" comment="myspell-ro_RO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520864" comment="myspell-ru_RU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520865" comment="myspell-sk_SK-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520866" comment="myspell-sl_SI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520867" comment="myspell-sr-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520868" comment="myspell-sr_CS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520869" comment="myspell-sr_Latn_CS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520870" comment="myspell-sr_Latn_RS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520871" comment="myspell-sr_RS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520872" comment="myspell-sv_FI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520873" comment="myspell-sv_SE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520874" comment="myspell-te-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520875" comment="myspell-te_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520876" comment="myspell-th_TH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520877" comment="myspell-uk_UA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520878" comment="myspell-vi-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520879" comment="myspell-vi_VN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520880" comment="myspell-zu_ZA-20180403-16.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004187.html" source="SUSE-SU"/>
		<reference ref_id="TID7022763" ref_url="https://www.suse.com/support/kb/doc/?id=7022763" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00035.html" source="SUSE-SU"/>
    <description>
    On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users' passwords, including administrative users and privileged service accounts (eg Domain Controllers).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057</cve>
	<bugzilla href="https://bugzilla.suse.com/1081024">SUSE bug 1081024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519667" comment="libdcerpc-binding0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519668" comment="libdcerpc-binding0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519669" comment="libdcerpc0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519670" comment="libdcerpc0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519671" comment="libndr-krb5pac0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519672" comment="libndr-krb5pac0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519673" comment="libndr-nbt0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519674" comment="libndr-nbt0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519675" comment="libndr-standard0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519676" comment="libndr-standard0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519677" comment="libndr0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519678" comment="libndr0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519679" comment="libnetapi0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519680" comment="libnetapi0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519681" comment="libsamba-credentials0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519682" comment="libsamba-credentials0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519683" comment="libsamba-errors0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519684" comment="libsamba-errors0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519685" comment="libsamba-hostconfig0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519686" comment="libsamba-hostconfig0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519687" comment="libsamba-passdb0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519688" comment="libsamba-passdb0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519689" comment="libsamba-util0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519690" comment="libsamba-util0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519691" comment="libsamdb0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519692" comment="libsamdb0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519693" comment="libsmbclient0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519694" comment="libsmbclient0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519695" comment="libsmbconf0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519696" comment="libsmbconf0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519697" comment="libsmbldap0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519698" comment="libsmbldap0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519699" comment="libtevent-util0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519700" comment="libtevent-util0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519701" comment="libwbclient0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519702" comment="libwbclient0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519703" comment="samba-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519704" comment="samba-client-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519705" comment="samba-client-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519706" comment="samba-doc-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519707" comment="samba-libs-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519708" comment="samba-libs-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519709" comment="samba-winbind-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519710" comment="samba-winbind-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0765-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0890-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00009.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519026" comment="libecpg6-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519027" comment="libpq5-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519028" comment="libpq5-32bit-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519029" comment="postgresql96-9.6.8-3.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519026" comment="libecpg6-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519027" comment="libpq5-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519028" comment="libpq5-32bit-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519149" comment="postgresql94-9.4.17-21.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519029" comment="postgresql96-9.6.8-3.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10583" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10583" ref_url="https://www.suse.com/security/cve/CVE-2018-10583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2485-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004840.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00019.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by xlink:href=file://192.168.0.2/test.jpg within an office:document-content element in a .odt XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10583/">CVE-2018-10583</cve>
	<bugzilla href="https://bugzilla.suse.com/1091606">SUSE bug 1091606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519986" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519987" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519988" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519989" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519990" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519991" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519992" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519993" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519994" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519995" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519996" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519997" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519998" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519999" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520000" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520001" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520002" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520003" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520004" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520005" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520006" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520007" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520008" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520009" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520010" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520011" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520012" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520013" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520014" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520015" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520016" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520017" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520018" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520019" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520020" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520021" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520022" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520023" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520024" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520025" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520026" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520027" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520028" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520029" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520030" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520031" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520032" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520033" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520034" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2712-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520304" comment="python-devel-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520049" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520304" comment="python-devel-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520050" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520051" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520052" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2712-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method.  An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520304" comment="python-devel-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520049" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520304" comment="python-devel-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520050" comment="python3-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520051" comment="python3-base-3.4.6-25.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520052" comment="python3-curses-3.4.6-25.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00011.html" source="SUSE-SU"/>
    <description>
    libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519128" comment="libvirt-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519129" comment="libvirt-client-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519130" comment="libvirt-client-32bit-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519131" comment="libvirt-daemon-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519132" comment="libvirt-daemon-config-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519133" comment="libvirt-daemon-config-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519134" comment="libvirt-daemon-driver-interface-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519135" comment="libvirt-daemon-driver-libxl-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519136" comment="libvirt-daemon-driver-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519137" comment="libvirt-daemon-driver-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519138" comment="libvirt-daemon-driver-nodedev-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519139" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519140" comment="libvirt-daemon-driver-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519141" comment="libvirt-daemon-driver-secret-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519142" comment="libvirt-daemon-driver-storage-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519143" comment="libvirt-daemon-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519144" comment="libvirt-daemon-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519145" comment="libvirt-daemon-xen-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519146" comment="libvirt-doc-2.0.0-27.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520603" comment="libvirt-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520604" comment="libvirt-admin-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520605" comment="libvirt-client-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520606" comment="libvirt-daemon-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520607" comment="libvirt-daemon-config-network-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520608" comment="libvirt-daemon-config-nwfilter-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520609" comment="libvirt-daemon-driver-interface-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520610" comment="libvirt-daemon-driver-libxl-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520611" comment="libvirt-daemon-driver-lxc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520612" comment="libvirt-daemon-driver-network-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520613" comment="libvirt-daemon-driver-nodedev-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520614" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520615" comment="libvirt-daemon-driver-qemu-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520616" comment="libvirt-daemon-driver-secret-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520617" comment="libvirt-daemon-driver-storage-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520618" comment="libvirt-daemon-driver-storage-core-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520619" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520620" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520621" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520622" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520623" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520624" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520625" comment="libvirt-daemon-lxc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520626" comment="libvirt-daemon-qemu-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520627" comment="libvirt-daemon-xen-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520628" comment="libvirt-doc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520629" comment="libvirt-libs-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520630" comment="virt-install-1.4.1-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520631" comment="virt-manager-1.4.1-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520632" comment="virt-manager-common-1.4.1-5.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<bugzilla href="https://bugzilla.suse.com/1083650">SUSE bug 1083650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1066" ref_url="https://www.suse.com/security/cve/CVE-2018-1066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1066/">CVE-2018-1066</cve>
	<bugzilla href="https://bugzilla.suse.com/1083640">SUSE bug 1083640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1071" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00001.html" source="SUSE-SU"/>
    <description>
    zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071</cve>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10754" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10754" ref_url="https://www.suse.com/security/cve/CVE-2018-10754" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006199.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10754/">CVE-2018-10754</cve>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522411" comment="libncurses5-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522412" comment="libncurses5-32bit-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522413" comment="libncurses6-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522414" comment="libncurses6-32bit-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522415" comment="ncurses-devel-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522416" comment="ncurses-utils-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522417" comment="tack-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522418" comment="terminfo-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522419" comment="terminfo-base-5.9-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10768" ref_url="https://www.suse.com/security/cve/CVE-2018-10768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006944.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference in the AnnotPath::getCoordsLength function in Annot.h in an Ubuntu package for Poppler 0.24.5. A crafted input will lead to a remote denial of service attack. Later Ubuntu packages such as for Poppler 0.41.0 are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10768/">CVE-2018-10768</cve>
	<bugzilla href="https://bugzilla.suse.com/1092105">SUSE bug 1092105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00055.html" source="SUSE-SU"/>
    <description>
    TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a heap-based buffer over-read, as demonstrated by bmp2tiff.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520078" comment="libtiff5-4.0.9-44.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520079" comment="libtiff5-32bit-4.0.9-44.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10780" ref_url="https://www.suse.com/security/cve/CVE-2018-10780" source="SUSE CVE"/>
    <description>
    Exiv2::Image::byteSwap2 in image.cpp in Exiv2 0.26 has a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-10780/">CVE-2018-10780</cve>
	<bugzilla href="https://bugzilla.suse.com/1092475">SUSE bug 1092475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10804" ref_url="https://www.suse.com/security/cve/CVE-2018-10804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    ImageMagick version 7.0.7-28 contains a memory leak in WriteTIFFImage in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10804/">CVE-2018-10804</cve>
	<bugzilla href="https://bugzilla.suse.com/1095813">SUSE bug 1095813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00040.html" source="SUSE-SU"/>
    <description>
    ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10811" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1083" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00001.html" source="SUSE-SU"/>
    <description>
    Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189668">SUSE bug 1189668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    Qemu emulator &lt;= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520417" comment="qemu-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520418" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520420" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520423" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521800" comment="qemu-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521801" comment="qemu-block-curl-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521802" comment="qemu-ipxe-1.0.0+-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521803" comment="qemu-kvm-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521804" comment="qemu-seabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521805" comment="qemu-sgabios-8-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521806" comment="qemu-tools-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521807" comment="qemu-vgabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521808" comment="qemu-x86-2.11.2-5.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00000.html" source="SUSE-SU"/>
    <description>
    It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520080" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520081" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520082" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00000.html" source="SUSE-SU"/>
    <description>
    It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520080" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520081" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520082" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00000.html" source="SUSE-SU"/>
    <description>
    A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520080" comment="gnutls-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520081" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520082" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0556-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190556-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00014.html" source="SUSE-SU"/>
    <description>
    The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852</cve>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521730" comment="libipa_hbac0-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521731" comment="libsss_idmap0-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521732" comment="libsss_nss_idmap0-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521733" comment="libsss_sudo-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521734" comment="python-sssd-config-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521735" comment="sssd-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521736" comment="sssd-32bit-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521737" comment="sssd-ad-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521738" comment="sssd-ipa-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521739" comment="sssd-krb5-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521740" comment="sssd-krb5-common-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521741" comment="sssd-ldap-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521742" comment="sssd-proxy-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521743" comment="sssd-tools-1.13.4-34.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522466" comment="libipa_hbac0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522467" comment="libsss_certmap0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522468" comment="libsss_idmap0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522469" comment="libsss_nss_idmap0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522470" comment="libsss_simpleifp0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522471" comment="python-sssd-config-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522472" comment="sssd-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522473" comment="sssd-32bit-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522474" comment="sssd-ad-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522475" comment="sssd-ipa-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522476" comment="sssd-krb5-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522477" comment="sssd-krb5-common-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522478" comment="sssd-ldap-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522479" comment="sssd-proxy-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522480" comment="sssd-tools-1.16.1-4.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2320-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00059.html" source="SUSE-SU"/>
    <description>
    A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110943">SUSE bug 1110943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519907" comment="libdcerpc-binding0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519908" comment="libdcerpc-binding0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519909" comment="libdcerpc0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519910" comment="libdcerpc0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519911" comment="libndr-krb5pac0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519912" comment="libndr-krb5pac0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519913" comment="libndr-nbt0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519914" comment="libndr-nbt0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519915" comment="libndr-standard0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519916" comment="libndr-standard0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519917" comment="libndr0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519918" comment="libndr0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519919" comment="libnetapi0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519920" comment="libnetapi0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519921" comment="libsamba-credentials0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519922" comment="libsamba-credentials0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519923" comment="libsamba-errors0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519924" comment="libsamba-errors0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519925" comment="libsamba-hostconfig0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519926" comment="libsamba-hostconfig0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519927" comment="libsamba-passdb0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519928" comment="libsamba-passdb0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519929" comment="libsamba-util0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519930" comment="libsamba-util0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519931" comment="libsamdb0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519932" comment="libsamdb0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519933" comment="libsmbclient0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519934" comment="libsmbclient0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519935" comment="libsmbconf0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519936" comment="libsmbconf0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519937" comment="libsmbldap0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519938" comment="libsmbldap0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519939" comment="libtevent-util0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519940" comment="libtevent-util0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519941" comment="libwbclient0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519942" comment="libwbclient0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519943" comment="samba-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519944" comment="samba-client-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519945" comment="samba-client-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519946" comment="samba-doc-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519947" comment="samba-libs-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519948" comment="samba-libs-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519949" comment="samba-winbind-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519950" comment="samba-winbind-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10860" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00069.html" source="SUSE-SU"/>
    <description>
    perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860</cve>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512593" comment="perl-Archive-Zip-1.34-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519976" comment="perl-Archive-Zip-1.34-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2193-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182193-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861</cve>
	<bugzilla href="https://bugzilla.suse.com/1099162">SUSE bug 1099162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512053" comment="ceph-common-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512054" comment="libcephfs2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512055" comment="librados2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512056" comment="libradosstriper1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512057" comment="librbd1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512058" comment="librgw2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512059" comment="python-cephfs-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512060" comment="python-rados-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512061" comment="python-rbd-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512062" comment="python-rgw-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519863" comment="ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519864" comment="libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519865" comment="librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519866" comment="libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519867" comment="librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519868" comment="librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519869" comment="python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519870" comment="python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519871" comment="python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519872" comment="python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10872" ref_url="https://www.suse.com/security/cve/CVE-2018-10872" source="SUSE CVE"/>
    <description>
    A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10872/">CVE-2018-10872</cve>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100835">SUSE bug 1100835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00029.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512476" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512477" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512478" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512479" comment="libspice-controller0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512480" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512481" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520040" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520041" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520042" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520043" comment="libspice-controller0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520046" comment="libspice-server1-0.12.8-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520044" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520045" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876</cve>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10877" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10880" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10882" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512476" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512477" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512478" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512479" comment="libspice-controller0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512480" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512481" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520040" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520041" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520042" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520043" comment="libspice-controller0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520046" comment="libspice-server1-0.12.8-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520044" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520045" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10900" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10900" ref_url="https://www.suse.com/security/cve/CVE-2018-10900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00044.html" source="SUSE-SU"/>
    <description>
    Network Manager VPNC plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. A new line character can be used to inject a Password helper parameter into the configuration data passed to VPNC, allowing an attacker to execute arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10900/">CVE-2018-10900</cve>
	<bugzilla href="https://bugzilla.suse.com/1101147">SUSE bug 1101147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519877" comment="NetworkManager-vpnc-1.0.8-8.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519878" comment="NetworkManager-vpnc-gnome-1.0.8-8.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519879" comment="NetworkManager-vpnc-lang-1.0.8-8.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10906" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00052.html" source="SUSE-SU"/>
    <description>
    In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127346">SUSE bug 1127346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127350">SUSE bug 1127350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512133" comment="fuse-2.9.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512134" comment="libfuse2-2.9.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520244" comment="fuse-2.9.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520245" comment="libfuse2-2.9.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1091" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0972-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520660" comment="kernel-default-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520661" comment="kernel-default-devel-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520662" comment="kernel-default-extra-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520663" comment="kernel-devel-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520664" comment="kernel-macros-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520665" comment="kernel-source-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520666" comment="kernel-syms-4.4.126-94.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10910" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10910" ref_url="https://www.suse.com/security/cve/CVE-2018-10910" source="SUSE CVE"/>
    <description>
    A bug in Bluez may allow for the Bluetooth Discoverable state being set to on when no Bluetooth agent is registered with the system. This situation could lead to the unauthorized pairing of certain Bluetooth devices without any form of authentication. Versions before bluez 5.51 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10910/">CVE-2018-10910</cve>
	<bugzilla href="https://bugzilla.suse.com/1102238">SUSE bug 1102238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338999" comment="gnome-bluetooth is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520265" comment="postgresql96-9.6.10-3.22.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10916" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0642-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190642-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0643-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190643-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00010.html" source="SUSE-SU"/>
    <description>
    It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal of all files in the current working directory of the victim's system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916</cve>
	<bugzilla href="https://bugzilla.suse.com/1103367">SUSE bug 1103367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521684" comment="lftp-4.7.4-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10918" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10918" ref_url="https://www.suse.com/security/cve/CVE-2018-10918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00059.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10918/">CVE-2018-10918</cve>
	<bugzilla href="https://bugzilla.suse.com/1103414">SUSE bug 1103414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004675.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00036.html" source="SUSE-SU"/>
    <description>
    The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919</cve>
	<bugzilla href="https://bugzilla.suse.com/1095057">SUSE bug 1095057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110943">SUSE bug 1110943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520194" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520195" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520196" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520197" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520198" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520199" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520200" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520201" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520202" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520203" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520204" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520205" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520206" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520207" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520208" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520209" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520210" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520211" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520212" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520213" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520214" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520215" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520216" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520217" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520218" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520219" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520220" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520221" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520222" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520223" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520224" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520225" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520226" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520227" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520228" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520229" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520230" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520231" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520232" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520233" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520234" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520235" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520236" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520237" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<bugzilla href="https://bugzilla.suse.com/1104202">SUSE bug 1104202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520265" comment="postgresql96-9.6.10-3.22.7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10933" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00042.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933</cve>
	<bugzilla href="https://bugzilla.suse.com/1108020">SUSE bug 1108020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520246" comment="libssh4-0.6.3-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334087" comment="libssh2_org is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10938" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<bugzilla href="https://bugzilla.suse.com/1087007">SUSE bug 1087007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1095" ref_url="https://www.suse.com/security/cve/CVE-2018-1095" source="SUSE CVE"/>
    <description>
    The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1095/">CVE-2018-1095</cve>
	<bugzilla href="https://bugzilla.suse.com/1087004">SUSE bug 1087004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10958" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10958" ref_url="https://www.suse.com/security/cve/CVE-2018-10958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
    <description>
    In types.cpp in Exiv2 0.26, a large size value may lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10958/">CVE-2018-10958</cve>
	<bugzilla href="https://bugzilla.suse.com/1092952">SUSE bug 1092952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10963" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
    <description>
    The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963</cve>
	<bugzilla href="https://bugzilla.suse.com/1092949">SUSE bug 1092949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519749" comment="libtiff5-4.0.9-44.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519750" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00002.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521021" comment="xen-4.9.2_06-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521022" comment="xen-libs-4.9.2_06-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521023" comment="xen-libs-32bit-4.9.2_06-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00002.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521021" comment="xen-4.9.2_06-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521022" comment="xen-libs-4.9.2_06-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521023" comment="xen-libs-32bit-4.9.2_06-3.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10998" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10998" ref_url="https://www.suse.com/security/cve/CVE-2018-10998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exiv2 0.26. readMetadata in jp2image.cpp allows remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-10998/">CVE-2018-10998</cve>
	<bugzilla href="https://bugzilla.suse.com/1093095">SUSE bug 1093095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11037" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11037" ref_url="https://www.suse.com/security/cve/CVE-2018-11037" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, the Exiv2::PngImage::printStructure function in pngimage.cpp allows remote attackers to cause an information leak via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11037/">CVE-2018-11037</cve>
	<bugzilla href="https://bugzilla.suse.com/1093475">SUSE bug 1093475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1106" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00066.html" source="SUSE-SU"/>
    <description>
    An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106</cve>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123722">SUSE bug 1123722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520667" comment="PackageKit-1.1.3-24.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520668" comment="PackageKit-backend-zypp-1.1.3-24.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520669" comment="PackageKit-gstreamer-plugin-1.1.3-24.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520670" comment="PackageKit-gtk3-module-1.1.3-24.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520671" comment="PackageKit-lang-1.1.3-24.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520672" comment="libpackagekit-glib2-18-1.1.3-24.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520673" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1108" ref_url="https://www.suse.com/security/cve/CVE-2018-1108" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1108/">CVE-2018-1108</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090818">SUSE bug 1090818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1111" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1111" ref_url="https://www.suse.com/security/cve/CVE-2018-1111" source="SUSE CVE"/>
    <description>
    DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1111/">CVE-2018-1111</cve>
	<bugzilla href="https://bugzilla.suse.com/1093364">SUSE bug 1093364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334179" comment="dhcp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1115" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1900-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115</cve>
	<bugzilla href="https://bugzilla.suse.com/1091610">SUSE bug 1091610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519715" comment="libecpg6-9.6.9-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519716" comment="libpq5-9.6.9-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519717" comment="libpq5-32bit-9.6.9-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519718" comment="postgresql96-9.6.9-3.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1116" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004366.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00030.html" source="SUSE-SU"/>
    <description>
    A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116</cve>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519852" comment="libpolkit0-0.113-5.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519853" comment="libpolkit0-32bit-0.113-5.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519854" comment="polkit-0.113-5.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519855" comment="typelib-1_0-Polkit-1_0-0.113-5.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092472">SUSE bug 1092472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11212" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334089" comment="libjpeg-turbo is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334090" comment="libjpeg62-turbo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00000.html" source="SUSE-SU"/>
    <description>
    stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00000.html" source="SUSE-SU"/>
    <description>
    An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<bugzilla href="https://bugzilla.suse.com/1092877">SUSE bug 1092877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-23 Q16 x86_64 2018-01-24, there is a heap-based buffer over-read in ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service (application crash in SetGrayscaleImage in MagickCore/quantize.c) via a crafted SUN image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251</cve>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11254" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11254" ref_url="https://www.suse.com/security/cve/CVE-2018-11254" source="SUSE CVE"/>
    <description>
    An issue was discovered in PoDoFo 0.9.5. There is an Excessive Recursion in the PdfPagesTree::GetPageNode() function of PdfPagesTree.cpp. Remote attackers could leverage this vulnerability to cause a denial of service through a crafted pdf file, a related issue to CVE-2017-8054.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11254/">CVE-2018-11254</cve>
	<bugzilla href="https://bugzilla.suse.com/1094315">SUSE bug 1094315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338990" comment="podofo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11255" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11255" ref_url="https://www.suse.com/security/cve/CVE-2018-11255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005711.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PoDoFo 0.9.5. The function PdfPage::GetPageNumber() in PdfPage.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11255/">CVE-2018-11255</cve>
	<bugzilla href="https://bugzilla.suse.com/1096890">SUSE bug 1096890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521960" comment="libpodofo0_9_2-0.9.2-3.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11256" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11256" ref_url="https://www.suse.com/security/cve/CVE-2018-11256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PoDoFo 0.9.5. The function PdfDocument::Append() in PdfDocument.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11256/">CVE-2018-11256</cve>
	<bugzilla href="https://bugzilla.suse.com/1096889">SUSE bug 1096889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2193-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182193-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html" source="SUSE-SU"/>
    <description>
    It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177843">SUSE bug 1177843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177859">SUSE bug 1177859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512053" comment="ceph-common-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512054" comment="libcephfs2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512055" comment="librados2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512056" comment="libradosstriper1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512057" comment="librbd1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512058" comment="librgw2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512059" comment="python-cephfs-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512060" comment="python-rados-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512061" comment="python-rbd-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512062" comment="python-rgw-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519863" comment="ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519864" comment="libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519865" comment="librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519866" comment="libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519867" comment="librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519868" comment="librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519869" comment="python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519870" comment="python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519871" comment="python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519872" comment="python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2193-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182193-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512053" comment="ceph-common-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512054" comment="libcephfs2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512055" comment="librados2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512056" comment="libradosstriper1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512057" comment="librbd1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512058" comment="librgw2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512059" comment="python-cephfs-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512060" comment="python-rados-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512061" comment="python-rbd-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512062" comment="python-rgw-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519863" comment="ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519864" comment="libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519865" comment="librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519866" comment="libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519867" comment="librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519868" comment="librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519869" comment="python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519870" comment="python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519871" comment="python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519872" comment="python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11354" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11355" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11361" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/dot11decrypt.c by avoiding a buffer overflow during FTE processing in Dot11DecryptTDLSDeriveKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00059.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139</cve>
	<bugzilla href="https://bugzilla.suse.com/1095048">SUSE bug 1095048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1140" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00059.html" source="SUSE-SU"/>
    <description>
    A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140</cve>
	<bugzilla href="https://bugzilla.suse.com/1095056">SUSE bug 1095056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11410" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11410" ref_url="https://www.suse.com/security/cve/CVE-2018-11410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Liblouis 3.5.0. A invalid free in the compileRule function in compileTranslationTable.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11410/">CVE-2018-11410</cve>
	<bugzilla href="https://bugzilla.suse.com/1094685">SUSE bug 1094685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334092" comment="liblouis is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11440" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11440" ref_url="https://www.suse.com/security/cve/CVE-2018-11440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html" source="SUSE-SU"/>
    <description>
    Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11440/">CVE-2018-11440</cve>
	<bugzilla href="https://bugzilla.suse.com/1095189">SUSE bug 1095189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096665">SUSE bug 1096665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520070" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520071" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520072" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11508" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11508" ref_url="https://www.suse.com/security/cve/CVE-2018-11508" source="SUSE CVE"/>
    <description>
    The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11508/">CVE-2018-11508</cve>
	<bugzilla href="https://bugzilla.suse.com/1094947">SUSE bug 1094947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1152" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo 1.5.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521124" comment="libjpeg-turbo-1.5.3-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521125" comment="libjpeg62-62.2.0-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521126" comment="libjpeg62-32bit-62.2.0-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521127" comment="libjpeg62-turbo-1.5.3-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521128" comment="libjpeg8-8.1.2-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521129" comment="libjpeg8-32bit-8.1.2-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521130" comment="libturbojpeg0-8.1.2-31.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11531" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11531" ref_url="https://www.suse.com/security/cve/CVE-2018-11531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
    <description>
    Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11531/">CVE-2018-11531</cve>
	<bugzilla href="https://bugzilla.suse.com/1095070">SUSE bug 1095070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11574" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11574" ref_url="https://www.suse.com/security/cve/CVE-2018-11574" source="SUSE CVE"/>
    <description>
    Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11574/">CVE-2018-11574</cve>
	<bugzilla href="https://bugzilla.suse.com/1096283">SUSE bug 1096283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339004" comment="ppp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11577" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11577" ref_url="https://www.suse.com/security/cve/CVE-2018-11577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html" source="SUSE-SU"/>
    <description>
    Liblouis 3.5.0 has a Segmentation fault in lou_logPrint in logging.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11577/">CVE-2018-11577</cve>
	<bugzilla href="https://bugzilla.suse.com/1095945">SUSE bug 1095945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520070" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520071" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520072" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1160" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1160" ref_url="https://www.suse.com/security/cve/CVE-2018-1160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004996.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00071.html" source="SUSE-SU"/>
    <description>
    Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1160/">CVE-2018-1160</cve>
	<bugzilla href="https://bugzilla.suse.com/1119540">SUSE bug 1119540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520453" comment="libatalk12-3.1.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520454" comment="netatalk-3.1.0-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11624" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11624" ref_url="https://www.suse.com/security/cve/CVE-2018-11624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00040.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-36 Q16, the ReadMATImage function in coders/mat.c allows attackers to cause a use after free via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11624/">CVE-2018-11624</cve>
	<bugzilla href="https://bugzilla.suse.com/1096203">SUSE bug 1096203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11625" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11625" ref_url="https://www.suse.com/security/cve/CVE-2018-11625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00040.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-37 Q16, SetGrayscaleImage in the quantize.c file allows attackers to cause a heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11625/">CVE-2018-11625</cve>
	<bugzilla href="https://bugzilla.suse.com/1096200">SUSE bug 1096200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11646" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646</cve>
	<bugzilla href="https://bugzilla.suse.com/1095611">SUSE bug 1095611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11655" ref_url="https://www.suse.com/security/cve/CVE-2018-11655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-20 Q16 x86_64, a memory leak vulnerability was found in the function GetImagePixelCache in MagickCore/cache.c, which allows attackers to cause a denial of service via a crafted CALS image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11655/">CVE-2018-11655</cve>
	<bugzilla href="https://bugzilla.suse.com/1095730">SUSE bug 1095730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11656" ref_url="https://www.suse.com/security/cve/CVE-2018-11656" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-20 Q16 x86_64, a memory leak vulnerability was found in the function ReadDCMImage in coders/dcm.c, which allows attackers to cause a denial of service via a crafted DCM image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11656/">CVE-2018-11656</cve>
	<bugzilla href="https://bugzilla.suse.com/1095726">SUSE bug 1095726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11683" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html" source="SUSE-SU"/>
    <description>
    Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683</cve>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096665">SUSE bug 1096665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520070" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520071" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520072" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11684" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html" source="SUSE-SU"/>
    <description>
    Liblouis 3.5.0 has a stack-based Buffer Overflow in the function includeFile in compileTranslationTable.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684</cve>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520070" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520071" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520072" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html" source="SUSE-SU"/>
    <description>
    Liblouis 3.5.0 has a stack-based Buffer Overflow in the function compileHyphenation in compileTranslationTable.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685</cve>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520070" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520071" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520072" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ versions 2.20.0 and 2.20.1, failed to perform TLS certificate verification for WebSocket connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712</cve>
	<bugzilla href="https://bugzilla.suse.com/1096061">SUSE bug 1096061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713</cve>
	<bugzilla href="https://bugzilla.suse.com/1096060">SUSE bug 1096060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11780" ref_url="https://www.suse.com/security/cve/CVE-2018-11780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2011-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192011-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html" source="SUSE-SU"/>
    <description>
    A potential Remote Code Execution bug exists with the PDFInfo plugin in Apache SpamAssassin before 3.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11780/">CVE-2018-11780</cve>
	<bugzilla href="https://bugzilla.suse.com/1108750">SUSE bug 1108750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522005" comment="perl-Mail-SpamAssassin-3.4.2-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522006" comment="spamassassin-3.4.2-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11781" ref_url="https://www.suse.com/security/cve/CVE-2018-11781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2011-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192011-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html" source="SUSE-SU"/>
    <description>
    Apache SpamAssassin 3.4.2 fixes a local user code injection in the meta rule syntax.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11781/">CVE-2018-11781</cve>
	<bugzilla href="https://bugzilla.suse.com/1108748">SUSE bug 1108748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522005" comment="perl-Mail-SpamAssassin-3.4.2-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522006" comment="spamassassin-3.4.2-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html" source="SUSE-SU"/>
    <description>
    m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520290" comment="qemu-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520291" comment="qemu-block-curl-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520292" comment="qemu-ipxe-1.0.0-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520293" comment="qemu-kvm-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520294" comment="qemu-seabios-1.10.2-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520295" comment="qemu-sgabios-8-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520296" comment="qemu-tools-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520297" comment="qemu-vgabios-1.10.2-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520298" comment="qemu-x86-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519821" comment="xen-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519822" comment="xen-libs-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519823" comment="xen-libs-32bit-4.9.2_08-3.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html" source="SUSE-SU"/>
    <description>
    libjpeg 9c has a large loop because read_pixel in rdtarga.c mishandles EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172994">SUSE bug 1172994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172995">SUSE bug 1172995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521124" comment="libjpeg-turbo-1.5.3-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521125" comment="libjpeg62-62.2.0-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521126" comment="libjpeg62-32bit-62.2.0-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521127" comment="libjpeg62-turbo-1.5.3-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521128" comment="libjpeg8-8.1.2-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521129" comment="libjpeg8-32bit-8.1.2-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521130" comment="libturbojpeg0-8.1.2-31.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00024.html" source="SUSE-SU"/>
    <description>
    In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099507">SUSE bug 1099507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1698-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00034.html" source="SUSE-SU"/>
    <description>
    mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101134">SUSE bug 1101134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512180" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512181" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519719" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12085" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html" source="SUSE-SU"/>
    <description>
    Liblouis 3.6.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085</cve>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520070" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520071" comment="liblouis9-2.6.4-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520072" comment="python3-louis-2.6.4-6.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12086" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135524">SUSE bug 1135524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521465" comment="libvirt-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521466" comment="libvirt-admin-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521467" comment="libvirt-client-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521468" comment="libvirt-daemon-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521469" comment="libvirt-daemon-config-network-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521470" comment="libvirt-daemon-config-nwfilter-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521471" comment="libvirt-daemon-driver-interface-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521472" comment="libvirt-daemon-driver-libxl-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521473" comment="libvirt-daemon-driver-lxc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521474" comment="libvirt-daemon-driver-network-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521475" comment="libvirt-daemon-driver-nodedev-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521476" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521477" comment="libvirt-daemon-driver-qemu-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521478" comment="libvirt-daemon-driver-secret-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521479" comment="libvirt-daemon-driver-storage-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521480" comment="libvirt-daemon-driver-storage-core-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521481" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521482" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521483" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521484" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521485" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521486" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521487" comment="libvirt-daemon-lxc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521488" comment="libvirt-daemon-qemu-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521489" comment="libvirt-daemon-xen-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521490" comment="libvirt-doc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521491" comment="libvirt-libs-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521156" comment="qemu-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521157" comment="qemu-block-curl-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521158" comment="qemu-ipxe-1.0.0+-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521159" comment="qemu-kvm-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521160" comment="qemu-seabios-1.10.2-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521161" comment="qemu-sgabios-8-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521162" comment="qemu-tools-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521163" comment="qemu-vgabios-1.10.2-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521164" comment="qemu-x86-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521172" comment="xen-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521173" comment="xen-libs-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521174" comment="xen-libs-32bit-4.9.4_04-3.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521848" comment="libvirt-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521849" comment="libvirt-admin-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521850" comment="libvirt-client-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521851" comment="libvirt-daemon-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521852" comment="libvirt-daemon-config-network-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521853" comment="libvirt-daemon-config-nwfilter-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521854" comment="libvirt-daemon-driver-interface-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521855" comment="libvirt-daemon-driver-libxl-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521856" comment="libvirt-daemon-driver-lxc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521857" comment="libvirt-daemon-driver-network-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521858" comment="libvirt-daemon-driver-nodedev-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521859" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521860" comment="libvirt-daemon-driver-qemu-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521861" comment="libvirt-daemon-driver-secret-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521862" comment="libvirt-daemon-driver-storage-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521863" comment="libvirt-daemon-driver-storage-core-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521864" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521865" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521866" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521867" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521868" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521869" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521870" comment="libvirt-daemon-lxc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521871" comment="libvirt-daemon-qemu-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521872" comment="libvirt-daemon-xen-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521873" comment="libvirt-doc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521874" comment="libvirt-libs-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521465" comment="libvirt-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521466" comment="libvirt-admin-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521467" comment="libvirt-client-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521468" comment="libvirt-daemon-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521469" comment="libvirt-daemon-config-network-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521470" comment="libvirt-daemon-config-nwfilter-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521471" comment="libvirt-daemon-driver-interface-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521472" comment="libvirt-daemon-driver-libxl-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521473" comment="libvirt-daemon-driver-lxc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521474" comment="libvirt-daemon-driver-network-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521475" comment="libvirt-daemon-driver-nodedev-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521476" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521477" comment="libvirt-daemon-driver-qemu-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521478" comment="libvirt-daemon-driver-secret-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521479" comment="libvirt-daemon-driver-storage-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521480" comment="libvirt-daemon-driver-storage-core-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521481" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521482" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521483" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521484" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521485" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521486" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521487" comment="libvirt-daemon-lxc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521488" comment="libvirt-daemon-qemu-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521489" comment="libvirt-daemon-xen-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521490" comment="libvirt-doc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521491" comment="libvirt-libs-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521156" comment="qemu-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521157" comment="qemu-block-curl-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521158" comment="qemu-ipxe-1.0.0+-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521159" comment="qemu-kvm-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521160" comment="qemu-seabios-1.10.2-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521161" comment="qemu-sgabios-8-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521162" comment="qemu-tools-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521163" comment="qemu-vgabios-1.10.2-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521164" comment="qemu-x86-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521172" comment="xen-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521173" comment="xen-libs-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521174" comment="xen-libs-32bit-4.9.4_04-3.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521848" comment="libvirt-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521849" comment="libvirt-admin-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521850" comment="libvirt-client-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521851" comment="libvirt-daemon-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521852" comment="libvirt-daemon-config-network-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521853" comment="libvirt-daemon-config-nwfilter-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521854" comment="libvirt-daemon-driver-interface-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521855" comment="libvirt-daemon-driver-libxl-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521856" comment="libvirt-daemon-driver-lxc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521857" comment="libvirt-daemon-driver-network-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521858" comment="libvirt-daemon-driver-nodedev-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521859" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521860" comment="libvirt-daemon-driver-qemu-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521861" comment="libvirt-daemon-driver-secret-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521862" comment="libvirt-daemon-driver-storage-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521863" comment="libvirt-daemon-driver-storage-core-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521864" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521865" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521866" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521867" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521868" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521869" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521870" comment="libvirt-daemon-lxc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521871" comment="libvirt-daemon-qemu-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521872" comment="libvirt-daemon-xen-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521873" comment="libvirt-doc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521874" comment="libvirt-libs-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521465" comment="libvirt-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521466" comment="libvirt-admin-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521467" comment="libvirt-client-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521468" comment="libvirt-daemon-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521469" comment="libvirt-daemon-config-network-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521470" comment="libvirt-daemon-config-nwfilter-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521471" comment="libvirt-daemon-driver-interface-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521472" comment="libvirt-daemon-driver-libxl-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521473" comment="libvirt-daemon-driver-lxc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521474" comment="libvirt-daemon-driver-network-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521475" comment="libvirt-daemon-driver-nodedev-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521476" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521477" comment="libvirt-daemon-driver-qemu-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521478" comment="libvirt-daemon-driver-secret-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521479" comment="libvirt-daemon-driver-storage-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521480" comment="libvirt-daemon-driver-storage-core-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521481" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521482" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521483" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521484" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521485" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521486" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521487" comment="libvirt-daemon-lxc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521488" comment="libvirt-daemon-qemu-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521489" comment="libvirt-daemon-xen-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521490" comment="libvirt-doc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521491" comment="libvirt-libs-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521156" comment="qemu-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521157" comment="qemu-block-curl-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521158" comment="qemu-ipxe-1.0.0+-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521159" comment="qemu-kvm-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521160" comment="qemu-seabios-1.10.2-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521161" comment="qemu-sgabios-8-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521162" comment="qemu-tools-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521163" comment="qemu-vgabios-1.10.2-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521164" comment="qemu-x86-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521172" comment="xen-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521173" comment="xen-libs-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521174" comment="xen-libs-32bit-4.9.4_04-3.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521848" comment="libvirt-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521849" comment="libvirt-admin-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521850" comment="libvirt-client-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521851" comment="libvirt-daemon-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521852" comment="libvirt-daemon-config-network-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521853" comment="libvirt-daemon-config-nwfilter-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521854" comment="libvirt-daemon-driver-interface-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521855" comment="libvirt-daemon-driver-libxl-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521856" comment="libvirt-daemon-driver-lxc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521857" comment="libvirt-daemon-driver-network-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521858" comment="libvirt-daemon-driver-nodedev-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521859" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521860" comment="libvirt-daemon-driver-qemu-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521861" comment="libvirt-daemon-driver-secret-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521862" comment="libvirt-daemon-driver-storage-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521863" comment="libvirt-daemon-driver-storage-core-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521864" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521865" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521866" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521867" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521868" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521869" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521870" comment="libvirt-daemon-lxc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521871" comment="libvirt-daemon-qemu-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521872" comment="libvirt-daemon-xen-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521873" comment="libvirt-doc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521874" comment="libvirt-libs-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12178" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178</cve>
	<bugzilla href="https://bugzilla.suse.com/1127821">SUSE bug 1127821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522489" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.8.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12179" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12179" ref_url="https://www.suse.com/security/cve/CVE-2018-12179" source="SUSE CVE"/>
    <description>
    Improper configuration in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12179/">CVE-2018-12179</cve>
	<bugzilla href="https://bugzilla.suse.com/1131360">SUSE bug 1131360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334095" comment="ovmf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180</cve>
	<bugzilla href="https://bugzilla.suse.com/1127820">SUSE bug 1127820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522489" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.8.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12181" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005268.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Stack overflow in corrupted bmp for EDK II may allow unprivileged user to potentially enable denial of service or elevation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181</cve>
	<bugzilla href="https://bugzilla.suse.com/1128503">SUSE bug 1128503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522499" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12182" ref_url="https://www.suse.com/security/cve/CVE-2018-12182" source="SUSE CVE"/>
    <description>
    Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12182/">CVE-2018-12182</cve>
	<bugzilla href="https://bugzilla.suse.com/1131363">SUSE bug 1131363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334095" comment="ovmf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12183" ref_url="https://www.suse.com/security/cve/CVE-2018-12183" source="SUSE CVE"/>
    <description>
    Stack overflow in DxeCore for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12183/">CVE-2018-12183</cve>
	<bugzilla href="https://bugzilla.suse.com/1131362">SUSE bug 1131362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334095" comment="ovmf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12193" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12193" ref_url="https://www.suse.com/security/cve/CVE-2018-12193" source="SUSE CVE"/>
    <description>
    Insufficient access control in driver stack for Intel QuickAssist Technology for Linux before version 4.2 may allow an unprivileged user to potentially disclose information via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12193/">CVE-2018-12193</cve>
	<bugzilla href="https://bugzilla.suse.com/1111631">SUSE bug 1111631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019411" ref_url="https://www.suse.com/support/kb/doc/?id=000019411" source="SUSE-SU"/>
		<reference ref_id="TID7023735" ref_url="https://www.suse.com/support/kb/doc/?id=7023735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html" source="SUSE-SU"/>
    <description>
    Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155812">SUSE bug 1155812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155817">SUSE bug 1155817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522354" comment="kernel-default-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522355" comment="kernel-default-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522356" comment="kernel-default-extra-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522357" comment="kernel-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522358" comment="kernel-macros-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522359" comment="kernel-source-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522360" comment="kernel-syms-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522361" comment="qemu-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522362" comment="qemu-block-curl-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522363" comment="qemu-ipxe-1.0.0+-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522364" comment="qemu-kvm-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522365" comment="qemu-seabios-1.11.0-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522366" comment="qemu-sgabios-8-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522367" comment="qemu-tools-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522368" comment="qemu-vgabios-1.11.0-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522369" comment="qemu-x86-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522371" comment="xen-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522372" comment="xen-libs-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522373" comment="xen-libs-32bit-4.11.2_04-2.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12232" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097593">SUSE bug 1097593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125907">SUSE bug 1125907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127757">SUSE bug 1127757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12233" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519726" comment="kernel-default-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519727" comment="kernel-default-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519728" comment="kernel-default-extra-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519729" comment="kernel-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519730" comment="kernel-macros-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519731" comment="kernel-source-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519732" comment="kernel-syms-4.4.138-94.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12327" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3342-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00069.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107887">SUSE bug 1107887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111552">SUSE bug 1111552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155513">SUSE bug 1155513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520262" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520263" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12368" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
    <description>
    Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems. *Note: this issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12376" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12377" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12378" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12379" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
    <description>
    When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12381" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
    <description>
    Manually dragging and dropping an Outlook email message into the browser will trigger a page navigation when the message's mail columns are incorrectly interpreted as a URL. *Note: this issue only affects Windows operating systems with Outlook installed. Other operating systems are not affected.*. This vulnerability affects Firefox ESR &lt; 60.2 and Firefox &lt; 62.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12383" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2.1, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00030.html" source="SUSE-SU"/>
    <description>
    When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12385" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird &lt; 60.2.1, Firefox ESR &lt; 60.2.1, and Firefox &lt; 62.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12386" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00002.html" source="SUSE-SU"/>
    <description>
    A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00002.html" source="SUSE-SU"/>
    <description>
    A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.3 and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
    <description>
    By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
    <description>
    A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
    <description>
    A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html" source="SUSE-SU"/>
    <description>
    A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00040.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520238" comment="ImageMagick-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520239" comment="libMagick++-6_Q16-3-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520241" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00040.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520238" comment="ImageMagick-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520239" comment="libMagick++-6_Q16-3-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520241" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html" source="SUSE-SU"/>
    <description>
    qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520290" comment="qemu-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520291" comment="qemu-block-curl-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520292" comment="qemu-ipxe-1.0.0-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520293" comment="qemu-kvm-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520294" comment="qemu-seabios-1.10.2-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520295" comment="qemu-sgabios-8-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520296" comment="qemu-tools-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520297" comment="qemu-vgabios-1.10.2-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520298" comment="qemu-x86-2.9.1-6.19.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12648" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12648" ref_url="https://www.suse.com/security/cve/CVE-2018-12648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005607.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1657-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00070.html" source="SUSE-SU"/>
    <description>
    The WEBP::GetLE32 function in XMPFiles/source/FormatSupport/WEBP_Support.hpp in Exempi 2.4.5 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12648/">CVE-2018-12648</cve>
	<bugzilla href="https://bugzilla.suse.com/1098946">SUSE bug 1098946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334096" comment="exempi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12886" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12886" ref_url="https://www.suse.com/security/cve/CVE-2018-12886" source="SUSE CVE"/>
    <description>
    stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12886/">CVE-2018-12886</cve>
	<bugzilla href="https://bugzilla.suse.com/1136032">SUSE bug 1136032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334156" comment="gcc48 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339005" comment="gcc7 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339006" comment="gcc8 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519821" comment="xen-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519822" comment="xen-libs-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519823" comment="xen-libs-32bit-4.9.2_08-3.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as "sd" in the libxl disk configuration, or an equivalent) are affected. IDE disks ("hd") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519821" comment="xen-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519822" comment="xen-libs-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519823" comment="xen-libs-32bit-4.9.2_08-3.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519821" comment="xen-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519822" comment="xen-libs-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519823" comment="xen-libs-32bit-4.9.2_08-3.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12896" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3947-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125113">SUSE bug 1125113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520382" comment="libtiff5-4.0.9-44.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520383" comment="libtiff5-32bit-4.0.9-44.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html" source="SUSE-SU"/>
    <description>
    The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512472" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512473" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512474" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512475" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519873" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519874" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519876" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12911" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    WebKitGTK+ 2.20.3 has an off-by-one error, with a resultant out-of-bounds write, in the get_simple_globs functions in ThirdParty/xdgmime/src/xdgmimecache.c and ThirdParty/xdgmime/src/xdgmimeglob.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911</cve>
	<bugzilla href="https://bugzilla.suse.com/1101999">SUSE bug 1101999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334097" comment="libQtWebKit4 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334098" comment="libqt5-qtwebkit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334099" comment="webkitgtk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334025" comment="webkitgtk3 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12982" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12982" ref_url="https://www.suse.com/security/cve/CVE-2018-12982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005711.html" source="SUSE-SU"/>
    <description>
    Invalid memory read in the PoDoFo::PdfVariant::DelayedLoad() function in PdfVariant.h in PoDoFo 0.9.6-rc1 allows remote attackers to have denial-of-service impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12982/">CVE-2018-12982</cve>
	<bugzilla href="https://bugzilla.suse.com/1099720">SUSE bug 1099720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521960" comment="libpodofo0_9_2-0.9.2-3.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519809" comment="kernel-default-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519810" comment="kernel-default-devel-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519811" comment="kernel-default-extra-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519812" comment="kernel-devel-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519813" comment="kernel-macros-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519814" comment="kernel-source-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519815" comment="kernel-syms-4.4.140-94.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13093" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13096" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13096" ref_url="https://www.suse.com/security/cve/CVE-2018-13096" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.14. A denial of service (out-of-bounds memory access and BUG) can occur upon encountering an abnormal bitmap size when mounting a crafted f2fs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-13096/">CVE-2018-13096</cve>
	<bugzilla href="https://bugzilla.suse.com/1100062">SUSE bug 1100062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted audio file. The vulnerability can be triggered by the executable sndfile-deinterleave.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519838" comment="libsndfile1-1.0.25-36.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519839" comment="libsndfile1-32bit-1.0.25-36.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195161">SUSE bug 1195161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519809" comment="kernel-default-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519810" comment="kernel-default-devel-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519811" comment="kernel-default-extra-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519812" comment="kernel-devel-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519813" comment="kernel-macros-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519814" comment="kernel-source-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519815" comment="kernel-syms-4.4.140-94.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13406" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519809" comment="kernel-default-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519810" comment="kernel-default-devel-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519811" comment="kernel-default-extra-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519812" comment="kernel-devel-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519813" comment="kernel-macros-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519814" comment="kernel-source-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519815" comment="kernel-syms-4.4.140-94.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13419" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13419" ref_url="https://www.suse.com/security/cve/CVE-2018-13419" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue has been found in libsndfile 1.0.28. There is a memory leak in psf_allocate in common.c, as demonstrated by sndfile-convert. NOTE: The maintainer and third parties were unable to reproduce and closed the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13419/">CVE-2018-13419</cve>
	<bugzilla href="https://bugzilla.suse.com/1100524">SUSE bug 1100524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334031" comment="libsndfile is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00021.html" source="SUSE-SU"/>
    <description>
    In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<bugzilla href="https://bugzilla.suse.com/1100687">SUSE bug 1100687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333964" comment="libpng12 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334101" comment="libpng15 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334102" comment="libpng16 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2778-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192778-1.html" source="SUSE-SU"/>
    <description>
    Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036</cve>
	<bugzilla href="https://bugzilla.suse.com/1099699">SUSE bug 1099699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101332">SUSE bug 1101332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112694">SUSE bug 1112694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522276" comment="accountsservice-0.6.42-16.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522277" comment="accountsservice-lang-0.6.42-16.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522278" comment="libaccountsservice0-0.6.42-16.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522279" comment="typelib-1_0-AccountsService-1_0-0.6.42-16.8.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14038" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14038" ref_url="https://www.suse.com/security/cve/CVE-2018-14038" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-7642. Reason: This candidate is a reservation duplicate of CVE-2018-7642. Notes: All CVE users should reference CVE-2018-7642 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14038/">CVE-2018-14038</cve>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128518">SUSE bug 1128518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14044" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14044" ref_url="https://www.suse.com/security/cve/CVE-2018-14044" source="SUSE CVE"/>
    <description>
    The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14044/">CVE-2018-14044</cve>
	<bugzilla href="https://bugzilla.suse.com/1101292">SUSE bug 1101292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339021" comment="soundtouch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14046" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14046" ref_url="https://www.suse.com/security/cve/CVE-2018-14046" source="SUSE CVE"/>
    <description>
    Exiv2 0.26 has a heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14046/">CVE-2018-14046</cve>
	<bugzilla href="https://bugzilla.suse.com/1101339">SUSE bug 1101339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14048" ref_url="https://www.suse.com/security/cve/CVE-2018-14048" source="SUSE CVE"/>
    <description>
    An issue has been found in libpng 1.6.34. It is a SEGV in the function png_free_data in png.c, related to the recommended error handling for png_read_image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14048/">CVE-2018-14048</cve>
	<bugzilla href="https://bugzilla.suse.com/1101418">SUSE bug 1101418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333964" comment="libpng12 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334101" comment="libpng15 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334102" comment="libpng16 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14320" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14320" ref_url="https://www.suse.com/security/cve/CVE-2018-14320" source="SUSE CVE"/>
    <description>
    This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of PoDoFo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within PdfEncoding::ParseToUnicode. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-5673.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14320/">CVE-2018-14320</cve>
	<bugzilla href="https://bugzilla.suse.com/1108764">SUSE bug 1108764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338990" comment="podofo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14338" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14338" ref_url="https://www.suse.com/security/cve/CVE-2018-14338" source="SUSE CVE"/>
    <description>
    samples/geotag.cpp in the example code of Exiv2 0.26 misuses the realpath function on POSIX platforms (other than Apple platforms) where glibc is not used, possibly leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-14338/">CVE-2018-14338</cve>
	<bugzilla href="https://bugzilla.suse.com/1101886">SUSE bug 1101886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14339" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14340" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14341" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14342" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14343" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14344" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14348" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004482.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00023.html" source="SUSE-SU"/>
    <description>
    libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348</cve>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519984" comment="libcgroup1-0.41.rc1-10.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14349" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14350" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14351" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101583">SUSE bug 1101583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14352" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14353" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14354" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14355" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14356" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14357" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101569">SUSE bug 1101569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14361" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101568">SUSE bug 1101568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14363" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101566">SUSE bug 1101566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14367" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14368" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14369" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14370" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00026.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148896">SUSE bug 1148896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520155" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520156" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520157" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520158" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14424" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004570.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2818-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00066.html" source="SUSE-SU"/>
    <description>
    The daemon in GDM through 3.29.1 does not properly unexport display objects from its D-Bus interface when they are destroyed, which allows a local attacker to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial of service or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424</cve>
	<bugzilla href="https://bugzilla.suse.com/1103737">SUSE bug 1103737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512145" comment="gdm-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512146" comment="gdm-lang-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512147" comment="gdmflexiserver-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512148" comment="libgdm1-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512149" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.6.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520035" comment="gdm-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520036" comment="gdm-lang-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520037" comment="gdmflexiserver-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520038" comment="libgdm1-3.10.0.1-54.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520039" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.6.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00062.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520065" comment="ImageMagick-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520066" comment="libMagick++-6_Q16-3-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520067" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520068" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520069" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00062.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in DecodeImage in coders/pcd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520065" comment="ImageMagick-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520066" comment="libMagick++-6_Q16-3-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520067" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520068" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520069" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00062.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520065" comment="ImageMagick-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520066" comment="libMagick++-6_Q16-3-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520067" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520068" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520069" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00062.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520065" comment="ImageMagick-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520066" comment="libMagick++-6_Q16-3-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520067" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520068" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520069" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14438" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14438" ref_url="https://www.suse.com/security/cve/CVE-2018-14438" source="SUSE CVE"/>
    <description>
    In Wireshark through 2.6.2, the create_app_running_mutex function in wsutil/file_util.c calls SetSecurityDescriptorDacl to set a NULL DACL, which allows attackers to modify the access control arbitrarily.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14438/">CVE-2018-14438</cve>
	<bugzilla href="https://bugzilla.suse.com/1102012">SUSE bug 1102012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14498" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005518.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html" source="SUSE-SU"/>
    <description>
    get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498</cve>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521124" comment="libjpeg-turbo-1.5.3-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521125" comment="libjpeg62-62.2.0-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521126" comment="libjpeg62-32bit-62.2.0-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521127" comment="libjpeg62-turbo-1.5.3-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521128" comment="libjpeg8-8.1.2-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521129" comment="libjpeg8-32bit-8.1.2-31.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521130" comment="libturbojpeg0-8.1.2-31.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521119" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14550" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14550" ref_url="https://www.suse.com/security/cve/CVE-2018-14550" source="SUSE CVE"/>
    <description>
    An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14550/">CVE-2018-14550</cve>
	<bugzilla href="https://bugzilla.suse.com/1102846">SUSE bug 1102846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333964" comment="libpng12 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334101" comment="libpng15 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334102" comment="libpng16 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14551" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14551" ref_url="https://www.suse.com/security/cve/CVE-2018-14551" source="SUSE CVE"/>
    <description>
    The ReadMATImageV4 function in coders/mat.c in ImageMagick 7.0.8-7 uses an uninitialized variable, leading to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14551/">CVE-2018-14551</cve>
	<bugzilla href="https://bugzilla.suse.com/1102401">SUSE bug 1102401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0594-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006588.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html" source="SUSE-SU"/>
    <description>
    gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553</cve>
	<bugzilla href="https://bugzilla.suse.com/1165471">SUSE bug 1165471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522663" comment="gd-2.1.0-24.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522664" comment="gd-32bit-2.1.0-24.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00029.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520155" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520156" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520157" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520158" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512231" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512232" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512233" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512234" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512235" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520164" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520165" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520166" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520167" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520168" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520169" comment="libxcb-dri2-0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520170" comment="libxcb-dri2-0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520171" comment="libxcb-dri3-0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520172" comment="libxcb-dri3-0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520173" comment="libxcb-glx0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520174" comment="libxcb-glx0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520175" comment="libxcb-present0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520176" comment="libxcb-present0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520177" comment="libxcb-randr0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520178" comment="libxcb-render0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520179" comment="libxcb-render0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520180" comment="libxcb-shape0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520181" comment="libxcb-shm0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520182" comment="libxcb-shm0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520183" comment="libxcb-sync1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520184" comment="libxcb-sync1-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520185" comment="libxcb-xf86dri0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520186" comment="libxcb-xfixes0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520187" comment="libxcb-xfixes0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520188" comment="libxcb-xinerama0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520189" comment="libxcb-xkb1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520190" comment="libxcb-xkb1-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520191" comment="libxcb-xv0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520192" comment="libxcb1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520193" comment="libxcb1-32bit-1.10-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512231" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512232" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512233" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512234" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512235" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520164" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520165" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520166" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520167" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520168" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520169" comment="libxcb-dri2-0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520170" comment="libxcb-dri2-0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520171" comment="libxcb-dri3-0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520172" comment="libxcb-dri3-0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520173" comment="libxcb-glx0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520174" comment="libxcb-glx0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520175" comment="libxcb-present0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520176" comment="libxcb-present0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520177" comment="libxcb-randr0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520178" comment="libxcb-render0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520179" comment="libxcb-render0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520180" comment="libxcb-shape0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520181" comment="libxcb-shm0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520182" comment="libxcb-shm0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520183" comment="libxcb-sync1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520184" comment="libxcb-sync1-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520185" comment="libxcb-xf86dri0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520186" comment="libxcb-xfixes0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520187" comment="libxcb-xfixes0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520188" comment="libxcb-xinerama0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520189" comment="libxcb-xkb1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520190" comment="libxcb-xkb1-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520191" comment="libxcb-xv0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520192" comment="libxcb1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520193" comment="libxcb1-32bit-1.10-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178417">SUSE bug 1178417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512231" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512232" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512233" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512234" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512235" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520164" comment="libX11-6-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520165" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520166" comment="libX11-data-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520167" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520168" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520169" comment="libxcb-dri2-0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520170" comment="libxcb-dri2-0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520171" comment="libxcb-dri3-0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520172" comment="libxcb-dri3-0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520173" comment="libxcb-glx0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520174" comment="libxcb-glx0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520175" comment="libxcb-present0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520176" comment="libxcb-present0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520177" comment="libxcb-randr0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520178" comment="libxcb-render0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520179" comment="libxcb-render0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520180" comment="libxcb-shape0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520181" comment="libxcb-shm0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520182" comment="libxcb-shm0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520183" comment="libxcb-sync1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520184" comment="libxcb-sync1-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520185" comment="libxcb-xf86dri0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520186" comment="libxcb-xfixes0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520187" comment="libxcb-xfixes0-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520188" comment="libxcb-xinerama0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520189" comment="libxcb-xkb1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520190" comment="libxcb-xkb1-32bit-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520191" comment="libxcb-xv0-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520192" comment="libxcb1-1.10-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520193" comment="libxcb1-32bit-1.10-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14609" ref_url="https://www.suse.com/security/cve/CVE-2018-14609" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14609/">CVE-2018-14609</cve>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103597">SUSE bug 1103597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14610" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14610" ref_url="https://www.suse.com/security/cve/CVE-2018-14610" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14610/">CVE-2018-14610</cve>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14611" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14611" ref_url="https://www.suse.com/security/cve/CVE-2018-14611" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14611/">CVE-2018-14611</cve>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14613" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613</cve>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103800">SUSE bug 1103800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520130" comment="kernel-default-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520131" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520132" comment="kernel-default-extra-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520136" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14617" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520130" comment="kernel-default-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520131" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520132" comment="kernel-default-extra-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520136" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00033.html" source="SUSE-SU"/>
    <description>
    curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520053" comment="curl-7.37.0-37.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520054" comment="libcurl4-7.37.0-37.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520055" comment="libcurl4-32bit-7.37.0-37.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14619" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14619" ref_url="https://www.suse.com/security/cve/CVE-2018-14619" source="SUSE CVE"/>
    <description>
    A flaw was found in the crypto subsystem of the Linux kernel before version kernel-4.15-rc4. The "null skcipher" was being dropped when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use leading to a local user being able to crash the system or possibly escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14619/">CVE-2018-14619</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106174">SUSE bug 1106174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14621" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14621" ref_url="https://www.suse.com/security/cve/CVE-2018-14621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004670.html" source="SUSE-SU"/>
    <description>
    An infinite loop vulnerability was found in libtirpc before version 1.0.2-rc2. With the port to using poll rather than select, exhaustion of file descriptors would cause the server to enter an infinite loop, consuming a large amount of CPU time and denying service to other clients until restarted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14621/">CVE-2018-14621</cve>
	<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334360" comment="libtirpc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14622" ref_url="https://www.suse.com/security/cve/CVE-2018-14622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004670.html" source="SUSE-SU"/>
    <description>
    A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14622/">CVE-2018-14622</cve>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334360" comment="libtirpc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14625" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14625" ref_url="https://www.suse.com/security/cve/CVE-2018-14625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-14625/">CVE-2018-14625</cve>
	<bugzilla href="https://bugzilla.suse.com/1106615">SUSE bug 1106615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14629" ref_url="https://www.suse.com/security/cve/CVE-2018-14629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004948.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was discovered in Samba's LDAP server before versions 4.7.12, 4.8.7, and 4.9.3. A CNAME loop could lead to infinite recursion in the server. An unprivileged local attacker could create such an entry, leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14629/">CVE-2018-14629</cve>
	<bugzilla href="https://bugzilla.suse.com/1116319">SUSE bug 1116319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520343" comment="kernel-default-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520344" comment="kernel-default-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520345" comment="kernel-default-extra-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520346" comment="kernel-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520347" comment="kernel-macros-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520348" comment="kernel-source-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520349" comment="kernel-syms-4.4.162-94.69.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14646" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14646" ref_url="https://www.suse.com/security/cve/CVE-2018-14646" source="SUSE CVE"/>
    <description>
    The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14646/">CVE-2018-14646</cve>
	<bugzilla href="https://bugzilla.suse.com/1117290">SUSE bug 1117290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521639" comment="python-devel-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521639" comment="python-devel-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14662" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14662" ref_url="https://www.suse.com/security/cve/CVE-2018-14662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html" source="SUSE-SU"/>
    <description>
    It was found Ceph versions before 13.2.4 that authenticated ceph users with read only permissions could steal dm-crypt encryption keys used in ceph disk encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14662/">CVE-2018-14662</cve>
	<bugzilla href="https://bugzilla.suse.com/1111177">SUSE bug 1111177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521644" comment="ceph-common-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521645" comment="libcephfs2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521646" comment="librados2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521647" comment="libradosstriper1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521648" comment="librbd1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521649" comment="librgw2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521650" comment="python-cephfs-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521651" comment="python-rados-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521652" comment="python-rbd-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521653" comment="python-rgw-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00022.html" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112020">SUSE bug 1112020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334106" comment="xorg-x11-server is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14678" ref_url="https://www.suse.com/security/cve/CVE-2018-14678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14678/">CVE-2018-14678</cve>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14679" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14680" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14681" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14682" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14722" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14722" ref_url="https://www.suse.com/security/cve/CVE-2018-14722" source="SUSE CVE"/>
    <description>
    An issue was discovered in evaluate_auto_mountpoint in btrfsmaintenance-functions in btrfsmaintenance through 0.4.1. Code execution as root can occur via a specially crafted filesystem label if btrfs-{scrub,balance,trim} are set to auto in /etc/sysconfig/btrfsmaintenance (this is not the default, though).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14722/">CVE-2018-14722</cve>
	<bugzilla href="https://bugzilla.suse.com/1102721">SUSE bug 1102721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334107" comment="btrfsmaintenance is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
    <description>
    drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131390">SUSE bug 1131390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519954" comment="kernel-default-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519955" comment="kernel-default-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519956" comment="kernel-default-extra-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519957" comment="kernel-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519958" comment="kernel-macros-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519959" comment="kernel-source-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519960" comment="kernel-syms-4.4.143-94.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14779" ref_url="https://www.suse.com/security/cve/CVE-2018-14779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005418.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00016.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 &gt; max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14779/">CVE-2018-14779</cve>
	<bugzilla href="https://bugzilla.suse.com/1104809">SUSE bug 1104809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512564" comment="libykcs11-1-1.5.0-3.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512565" comment="libykpiv1-1.5.0-3.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512566" comment="yubico-piv-tool-1.5.0-3.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14780" ref_url="https://www.suse.com/security/cve/CVE-2018-14780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005418.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00016.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `_ykpiv_fetch_object()`: {% highlight c %} if(sw == SW_SUCCESS) { size_t outlen; int offs = _ykpiv_get_length(data + 1, &amp;outlen); if(offs == 0) { return YKPIV_SIZE_ERROR; } memmove(data, data + 1 + offs, outlen); *len = outlen; return YKPIV_OK; } else { return YKPIV_GENERIC_ERROR; } {% endhighlight %} -- in the end, a `memmove()` occurs with a length retrieved from APDU data. This length is not checked for whether it is outside of the APDU data retrieved. Therefore the `memmove()` could copy bytes behind the allocated data buffer into this buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14780/">CVE-2018-14780</cve>
	<bugzilla href="https://bugzilla.suse.com/1104809">SUSE bug 1104809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104811">SUSE bug 1104811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512564" comment="libykcs11-1-1.5.0-3.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512565" comment="libykpiv1-1.5.0-3.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512566" comment="yubico-piv-tool-1.5.0-3.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14939" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14939" ref_url="https://www.suse.com/security/cve/CVE-2018-14939" source="SUSE CVE"/>
    <description>
    The get_app_path function in desktop/unx/source/start.c in LibreOffice through 6.0.5 mishandles the realpath function in certain environments such as FreeBSD libc, which might allow attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact if LibreOffice is automatically launched during web browsing with pathnames controlled by a remote web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14939/">CVE-2018-14939</cve>
	<bugzilla href="https://bugzilla.suse.com/1103850">SUSE bug 1103850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333957" comment="libreoffice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004568.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00043.html" source="SUSE-SU"/>
    <description>
    libpango in Pango 1.40.8 through 1.42.3, as used in hexchat and other products, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted text with invalid Unicode sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120</cve>
	<bugzilla href="https://bugzilla.suse.com/1103877">SUSE bug 1103877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334108" comment="pango is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15209" ref_url="https://www.suse.com/security/cve/CVE-2018-15209" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
    <description>
    ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15209/">CVE-2018-15209</cve>
	<bugzilla href="https://bugzilla.suse.com/1104141">SUSE bug 1104141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15378" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
    <description>
    A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520284" comment="xen-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520285" comment="xen-libs-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520286" comment="xen-libs-32bit-4.9.3_03-3.44.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469</cve>
	<bugzilla href="https://bugzilla.suse.com/1103275">SUSE bug 1103275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520284" comment="xen-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520285" comment="xen-libs-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520286" comment="xen-libs-32bit-4.9.3_03-3.44.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470</cve>
	<bugzilla href="https://bugzilla.suse.com/1103279">SUSE bug 1103279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520284" comment="xen-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520285" comment="xen-libs-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520286" comment="xen-libs-32bit-4.9.3_03-3.44.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3776-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1383-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMNIMCAHIBHI4ABCI2JE3E6E2SYDAP2T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F33WEA5KQR7XFYMXJPGRCG4IZX75GFRO/" source="SUSE-SU"/>
    <description>
    OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123133">SUSE bug 1123133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520384" comment="openssh-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520385" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520386" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15518" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520430" comment="libQt5Concurrent5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520431" comment="libQt5Core5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520432" comment="libQt5DBus5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520433" comment="libQt5Gui5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520434" comment="libQt5Network5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520435" comment="libQt5OpenGL5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520436" comment="libQt5PrintSupport5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520437" comment="libQt5Sql5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520438" comment="libQt5Sql5-mysql-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520439" comment="libQt5Sql5-postgresql-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520440" comment="libQt5Sql5-sqlite-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520441" comment="libQt5Sql5-unixODBC-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520442" comment="libQt5Test5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520443" comment="libQt5Widgets5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520444" comment="libQt5Xml5-5.6.2-6.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15572" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15587" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1266-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1391-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00024.html" source="SUSE-SU"/>
    <description>
    GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587</cve>
	<bugzilla href="https://bugzilla.suse.com/1125230">SUSE bug 1125230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521230" comment="evolution-3.22.6-19.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521231" comment="evolution-lang-3.22.6-19.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00025.html" source="SUSE-SU"/>
    <description>
    A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15687" ref_url="https://www.suse.com/security/cve/CVE-2018-15687" source="SUSE CVE"/>
    <description>
    A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15687/">CVE-2018-15687</cve>
	<bugzilla href="https://bugzilla.suse.com/1113666">SUSE bug 1113666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00025.html" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113669">SUSE bug 1113669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520417" comment="qemu-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520418" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520420" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520423" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521800" comment="qemu-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521801" comment="qemu-block-curl-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521802" comment="qemu-ipxe-1.0.0+-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521803" comment="qemu-kvm-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521804" comment="qemu-seabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521805" comment="qemu-sgabios-8-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521806" comment="qemu-tools-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521807" comment="qemu-vgabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521808" comment="qemu-x86-2.11.2-5.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16151" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16152" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115593">SUSE bug 1115593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520130" comment="kernel-default-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520131" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520132" comment="kernel-default-extra-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520136" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7F42RBJPTM53DGGULUXWD56J42LIIEII/" source="SUSE-SU"/>
    <description>
    The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522251" comment="libpcap1-32bit-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
    <description>
    ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520065" comment="ImageMagick-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520066" comment="libMagick++-6_Q16-3-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520067" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520068" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520069" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16328" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16328" ref_url="https://www.suse.com/security/cve/CVE-2018-16328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the CheckEventLogging function in MagickCore/log.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16328/">CVE-2018-16328</cve>
	<bugzilla href="https://bugzilla.suse.com/1106857">SUSE bug 1106857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16329" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the GetMagickProperty function in MagickCore/property.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329</cve>
	<bugzilla href="https://bugzilla.suse.com/1106858">SUSE bug 1106858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520065" comment="ImageMagick-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520066" comment="libMagick++-6_Q16-3-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520067" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520068" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520069" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16335" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520255" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520256" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16391" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a Muscle Card in muscle_list_files in libopensc/card-muscle.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391</cve>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a TCOS Card in tcos_select_file in libopensc/card-tcos.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392</cve>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16393" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a Gemsafe V1 Smartcard in gemsafe_get_cert_len in libopensc/pkcs15-gemsafeV1.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393</cve>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402</cve>
	<bugzilla href="https://bugzilla.suse.com/1107066">SUSE bug 1107066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the MagickCore/quantum-private.h PushShortPixel function when called from the coders/psd.c ParseImageResourceBlocks function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16418" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    A buffer overflow when handling string concatenation in util_acl_to_str in tools/util.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418</cve>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16419" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419</cve>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16420" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420</cve>
	<bugzilla href="https://bugzilla.suse.com/1107097">SUSE bug 1107097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16421" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16421" ref_url="https://www.suse.com/security/cve/CVE-2018-16421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a CAC Card in cac_get_serial_nr_from_CUID in libopensc/card-cac.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16421/">CVE-2018-16421</cve>
	<bugzilla href="https://bugzilla.suse.com/1107049">SUSE bug 1107049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334110" comment="opensc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16422" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    A single byte buffer overflow when handling responses from an esteid Card in sc_pkcs15emu_esteid_init in libopensc/pkcs15-esteid.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422</cve>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16423" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    A double free when handling responses from a smartcard in sc_file_set_sec_attr in libopensc/sc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423</cve>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16424" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16424" ref_url="https://www.suse.com/security/cve/CVE-2018-16424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    A double free when handling responses in read_file in tools/egk-tool.c (aka the eGK card tool) in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16424/">CVE-2018-16424</cve>
	<bugzilla href="https://bugzilla.suse.com/1107036">SUSE bug 1107036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334110" comment="opensc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16425" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16425" ref_url="https://www.suse.com/security/cve/CVE-2018-16425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    A double free when handling responses from an HSM Card in sc_pkcs15emu_sc_hsm_init in libopensc/pkcs15-sc-hsm.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16425/">CVE-2018-16425</cve>
	<bugzilla href="https://bugzilla.suse.com/1107035">SUSE bug 1107035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334110" comment="opensc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16426" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Endless recursion when handling responses from an IAS-ECC card in iasecc_select_file in libopensc/card-iasecc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to hang or crash the opensc library using programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426</cve>
	<bugzilla href="https://bugzilla.suse.com/1107034">SUSE bug 1107034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16427" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427</cve>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00005.html" source="SUSE-SU"/>
    <description>
    In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521552" comment="libgio-fam-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3966-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183966-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00005.html" source="SUSE-SU"/>
    <description>
    GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521552" comment="libgio-fam-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16435" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<bugzilla href="https://bugzilla.suse.com/1108813">SUSE bug 1108813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512209" comment="lcms2-2.7-9.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512210" comment="liblcms2-2-2.7-9.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512211" comment="liblcms2-2-32bit-2.7-9.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520287" comment="lcms2-2.7-9.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520288" comment="liblcms2-2-2.7-9.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520289" comment="liblcms2-2-32bit-2.7-9.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16548" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16548" ref_url="https://www.suse.com/security/cve/CVE-2018-16548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00065.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16548/">CVE-2018-16548</cve>
	<bugzilla href="https://bugzilla.suse.com/1107424">SUSE bug 1107424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522432" comment="libzzip-0-13-0.13.67-10.25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16597" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16597" ref_url="https://www.suse.com/security/cve/CVE-2018-16597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16597/">CVE-2018-16597</cve>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520130" comment="kernel-default-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520131" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520132" comment="kernel-default-extra-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520136" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640</cve>
	<bugzilla href="https://bugzilla.suse.com/1107619">SUSE bug 1107619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520159" comment="ImageMagick-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520160" comment="libMagick++-6_Q16-3-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520162" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16641" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16641" ref_url="https://www.suse.com/security/cve/CVE-2018-16641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-6 has a memory leak vulnerability in the TIFFWritePhotoshopLayers function in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16641/">CVE-2018-16641</cve>
	<bugzilla href="https://bugzilla.suse.com/1107618">SUSE bug 1107618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
    <description>
    The function InsertRow in coders/cut.c in ImageMagick 7.0.7-37 allows remote attackers to cause a denial of service via a crafted image file due to an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520159" comment="ImageMagick-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520160" comment="libMagick++-6_Q16-3-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520162" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16643" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
    <description>
    The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520159" comment="ImageMagick-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520160" comment="libMagick++-6_Q16-3-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520162" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
    <description>
    There is an excessive memory allocation issue in the functions ReadBMPImage of coders/bmp.c and ReadDIBImage of coders/dib.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520159" comment="ImageMagick-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520160" comment="libMagick++-6_Q16-3-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520162" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16741" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00027.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &amp;&amp;, or &gt; characters within a file created by the "faxq-helper activate &lt;jobid&gt;" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741</cve>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512135" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512136" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520126" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520127" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16742" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00027.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In contrib/scrts.c, a stack-based buffer overflow can be triggered via a command-line parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742</cve>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512135" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512136" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520126" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520127" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16743" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00027.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743</cve>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512135" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512136" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520126" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520127" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16744" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00027.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744</cve>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512135" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512136" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520126" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520127" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16745" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00027.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745</cve>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512135" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512136" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520126" comment="g3utils-1.1.36-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520127" comment="mgetty-1.1.36-58.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16749" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749</cve>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520159" comment="ImageMagick-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520160" comment="libMagick++-6_Q16-3-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520162" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c was found.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750</cve>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520159" comment="ImageMagick-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520160" comment="libMagick++-6_Q16-3-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520162" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16838" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1576-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00051.html" source="SUSE-SU"/>
    <description>
    A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838</cve>
	<bugzilla href="https://bugzilla.suse.com/1124194">SUSE bug 1124194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521438" comment="libipa_hbac0-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521439" comment="libsss_idmap0-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521440" comment="libsss_nss_idmap0-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521441" comment="libsss_sudo-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521442" comment="python-sssd-config-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521443" comment="sssd-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521444" comment="sssd-ad-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521445" comment="sssd-ipa-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521446" comment="sssd-krb5-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521447" comment="sssd-krb5-common-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521448" comment="sssd-ldap-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521449" comment="sssd-proxy-1.13.4-34.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521450" comment="sssd-tools-1.13.4-34.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521875" comment="libipa_hbac0-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521876" comment="libsss_certmap0-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521877" comment="libsss_idmap0-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521878" comment="libsss_nss_idmap0-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521879" comment="libsss_simpleifp0-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521880" comment="python-sssd-config-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521881" comment="sssd-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521882" comment="sssd-32bit-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521883" comment="sssd-ad-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521884" comment="sssd-ipa-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521885" comment="sssd-krb5-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521886" comment="sssd-krb5-common-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521887" comment="sssd-ldap-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521888" comment="sssd-proxy-1.16.1-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521889" comment="sssd-tools-1.16.1-4.12.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00012.html" source="SUSE-SU"/>
    <description>
    Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113029">SUSE bug 1113029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521781" comment="curl-7.37.0-37.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521782" comment="libcurl4-7.37.0-37.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521783" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522450" comment="curl-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522451" comment="libcurl4-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522452" comment="libcurl4-32bit-7.60.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113029">SUSE bug 1113029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520335" comment="curl-7.37.0-37.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520336" comment="libcurl4-7.37.0-37.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520337" comment="libcurl4-32bit-7.37.0-37.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522450" comment="curl-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522451" comment="libcurl4-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522452" comment="libcurl4-32bit-7.60.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16841" ref_url="https://www.suse.com/security/cve/CVE-2018-16841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004948.html" source="SUSE-SU"/>
    <description>
    Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16841/">CVE-2018-16841</cve>
	<bugzilla href="https://bugzilla.suse.com/1116320">SUSE bug 1116320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00012.html" source="SUSE-SU"/>
    <description>
    Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520335" comment="curl-7.37.0-37.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520336" comment="libcurl4-7.37.0-37.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520337" comment="libcurl4-32bit-7.37.0-37.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522450" comment="curl-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522451" comment="libcurl4-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522452" comment="libcurl4-32bit-7.60.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16846" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16846" ref_url="https://www.suse.com/security/cve/CVE-2018-16846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html" source="SUSE-SU"/>
    <description>
    It was found in Ceph versions before 13.2.4 that authenticated ceph RGW users can cause a denial of service against OMAPs holding bucket indices.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16846/">CVE-2018-16846</cve>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521644" comment="ceph-common-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521645" comment="libcephfs2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521646" comment="librados2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521647" comment="libradosstriper1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521648" comment="librbd1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521649" comment="librgw2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521650" comment="python-cephfs-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521651" comment="python-rados-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521652" comment="python-rbd-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521653" comment="python-rgw-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16847" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00036.html" source="SUSE-SU"/>
    <description>
    An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847</cve>
	<bugzilla href="https://bugzilla.suse.com/1114529">SUSE bug 1114529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114540">SUSE bug 1114540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521800" comment="qemu-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521801" comment="qemu-block-curl-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521802" comment="qemu-ipxe-1.0.0+-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521803" comment="qemu-kvm-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521804" comment="qemu-seabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521805" comment="qemu-sgabios-8-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521806" comment="qemu-tools-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521807" comment="qemu-vgabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521808" comment="qemu-x86-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16850" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3770-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3942-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183942-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00009.html" source="SUSE-SU"/>
    <description>
    postgresql before versions 11.1, 10.6 is vulnerable to a to SQL injection in pg_upgrade and pg_dump via CREATE TRIGGER ... REFERENCING. Using a purpose-crafted trigger definition, an attacker can cause arbitrary SQL statements to run, with superuser privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850</cve>
	<bugzilla href="https://bugzilla.suse.com/1114837">SUSE bug 1114837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520361" comment="libecpg6-10.6-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520362" comment="libpq5-10.6-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520363" comment="libpq5-32bit-10.6-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520364" comment="postgresql10-10.6-1.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16851" ref_url="https://www.suse.com/security/cve/CVE-2018-16851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004948.html" source="SUSE-SU"/>
    <description>
    Samba from version 4.0.0 and before versions 4.7.12, 4.8.7, 4.9.3 is vulnerable to a denial of service. During the processing of an LDAP search before Samba's AD DC returns the LDAP entries to the client, the entries are cached in a single memory object with a maximum size of 256MB. When this size is reached, the Samba process providing the LDAP service will follow the NULL pointer, terminating the process. There is no further vulnerability associated with this issue, merely a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16851/">CVE-2018-16851</cve>
	<bugzilla href="https://bugzilla.suse.com/1116322">SUSE bug 1116322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16852" ref_url="https://www.suse.com/security/cve/CVE-2018-16852" source="SUSE CVE"/>
    <description>
    Samba from version 4.9.0 and before version 4.9.3 is vulnerable to a NULL pointer de-reference. During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate. There is no further vulnerability associated with this issue, merely a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16852/">CVE-2018-16852</cve>
	<bugzilla href="https://bugzilla.suse.com/1116321">SUSE bug 1116321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16853" ref_url="https://www.suse.com/security/cve/CVE-2018-16853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004948.html" source="SUSE-SU"/>
    <description>
    Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16853/">CVE-2018-16853</cve>
	<bugzilla href="https://bugzilla.suse.com/1116324">SUSE bug 1116324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16857" ref_url="https://www.suse.com/security/cve/CVE-2018-16857" source="SUSE CVE"/>
    <description>
    Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16857/">CVE-2018-16857</cve>
	<bugzilla href="https://bugzilla.suse.com/1116323">SUSE bug 1116323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16858" ref_url="https://www.suse.com/security/cve/CVE-2018-16858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1448-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191448-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2003-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192003-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00059.html" source="SUSE-SU"/>
    <description>
    It was found that libreoffice before versions 6.0.7 and 6.1.3 was vulnerable to a directory traversal attack which could be used to execute arbitrary macros bundled with a document. An attacker could craft a document, which when opened by LibreOffice, would execute a Python method from a script in any arbitrary file system location, specified relative to the LibreOffice install location.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16858/">CVE-2018-16858</cve>
	<bugzilla href="https://bugzilla.suse.com/1124062">SUSE bug 1124062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146107">SUSE bug 1146107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521247" comment="libixion-0_14-0-0.14.1-13.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521248" comment="liborcus-0_14-0-0.14.1-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521249" comment="libreoffice-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521250" comment="libreoffice-base-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521251" comment="libreoffice-base-drivers-postgresql-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521252" comment="libreoffice-branding-upstream-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521253" comment="libreoffice-calc-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521254" comment="libreoffice-calc-extensions-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521255" comment="libreoffice-draw-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521256" comment="libreoffice-filters-optional-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521257" comment="libreoffice-gnome-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521258" comment="libreoffice-gtk2-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521259" comment="libreoffice-icon-themes-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521260" comment="libreoffice-impress-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521261" comment="libreoffice-l10n-af-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521262" comment="libreoffice-l10n-ar-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521263" comment="libreoffice-l10n-ca-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521264" comment="libreoffice-l10n-cs-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521265" comment="libreoffice-l10n-da-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521266" comment="libreoffice-l10n-de-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521267" comment="libreoffice-l10n-en-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521268" comment="libreoffice-l10n-es-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521269" comment="libreoffice-l10n-fi-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521270" comment="libreoffice-l10n-fr-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521271" comment="libreoffice-l10n-gu-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521272" comment="libreoffice-l10n-hi-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521273" comment="libreoffice-l10n-hu-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521274" comment="libreoffice-l10n-it-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521275" comment="libreoffice-l10n-ja-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521276" comment="libreoffice-l10n-ko-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521277" comment="libreoffice-l10n-nb-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521278" comment="libreoffice-l10n-nl-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521279" comment="libreoffice-l10n-nn-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521280" comment="libreoffice-l10n-pl-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521281" comment="libreoffice-l10n-pt_BR-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521282" comment="libreoffice-l10n-pt_PT-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521283" comment="libreoffice-l10n-ro-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521284" comment="libreoffice-l10n-ru-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521285" comment="libreoffice-l10n-sk-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521286" comment="libreoffice-l10n-sv-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521287" comment="libreoffice-l10n-xh-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521288" comment="libreoffice-l10n-zh_CN-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521289" comment="libreoffice-l10n-zh_TW-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521290" comment="libreoffice-l10n-zu-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521291" comment="libreoffice-mailmerge-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521292" comment="libreoffice-math-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521293" comment="libreoffice-officebean-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521294" comment="libreoffice-pyuno-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521295" comment="libreoffice-writer-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521296" comment="libreoffice-writer-extensions-6.2.3.2-43.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521297" comment="libwps-0_4-4-0.4.10-10.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521298" comment="myspell-af_NA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521299" comment="myspell-af_ZA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521300" comment="myspell-ar-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521301" comment="myspell-ar_AE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521302" comment="myspell-ar_BH-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521303" comment="myspell-ar_DZ-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521304" comment="myspell-ar_EG-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521305" comment="myspell-ar_IQ-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521306" comment="myspell-ar_JO-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521307" comment="myspell-ar_KW-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521308" comment="myspell-ar_LB-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521309" comment="myspell-ar_LY-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521310" comment="myspell-ar_MA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521311" comment="myspell-ar_OM-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521312" comment="myspell-ar_QA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521313" comment="myspell-ar_SA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521314" comment="myspell-ar_SD-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521315" comment="myspell-ar_SY-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521316" comment="myspell-ar_TN-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521317" comment="myspell-ar_YE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521318" comment="myspell-be_BY-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521319" comment="myspell-bg_BG-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521320" comment="myspell-bn_BD-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521321" comment="myspell-bn_IN-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521322" comment="myspell-bs-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521323" comment="myspell-bs_BA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521324" comment="myspell-ca-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521325" comment="myspell-ca_AD-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521326" comment="myspell-ca_ES-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521327" comment="myspell-ca_ES_valencia-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521328" comment="myspell-ca_FR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521329" comment="myspell-ca_IT-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521330" comment="myspell-cs_CZ-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521331" comment="myspell-da_DK-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521332" comment="myspell-de-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521333" comment="myspell-de_AT-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521334" comment="myspell-de_CH-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521335" comment="myspell-de_DE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521336" comment="myspell-dictionaries-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521337" comment="myspell-el_GR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521338" comment="myspell-en-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521339" comment="myspell-en_AU-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521340" comment="myspell-en_BS-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521341" comment="myspell-en_BZ-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521342" comment="myspell-en_CA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521343" comment="myspell-en_GB-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521344" comment="myspell-en_GH-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521345" comment="myspell-en_IE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521346" comment="myspell-en_IN-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521347" comment="myspell-en_JM-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521348" comment="myspell-en_MW-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521349" comment="myspell-en_NA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521350" comment="myspell-en_NZ-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521351" comment="myspell-en_PH-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521352" comment="myspell-en_TT-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521353" comment="myspell-en_US-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521354" comment="myspell-en_ZA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521355" comment="myspell-en_ZW-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521356" comment="myspell-es-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521357" comment="myspell-es_AR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521358" comment="myspell-es_BO-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521359" comment="myspell-es_CL-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521360" comment="myspell-es_CO-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521361" comment="myspell-es_CR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521362" comment="myspell-es_CU-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521363" comment="myspell-es_DO-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521364" comment="myspell-es_EC-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521365" comment="myspell-es_ES-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521366" comment="myspell-es_GT-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521367" comment="myspell-es_HN-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521368" comment="myspell-es_MX-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521369" comment="myspell-es_NI-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521370" comment="myspell-es_PA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521371" comment="myspell-es_PE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521372" comment="myspell-es_PR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521373" comment="myspell-es_PY-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521374" comment="myspell-es_SV-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521375" comment="myspell-es_UY-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521376" comment="myspell-es_VE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521377" comment="myspell-et_EE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521378" comment="myspell-fr_BE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521379" comment="myspell-fr_CA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521380" comment="myspell-fr_CH-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521381" comment="myspell-fr_FR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521382" comment="myspell-fr_LU-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521383" comment="myspell-fr_MC-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521384" comment="myspell-gu_IN-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521385" comment="myspell-he_IL-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521386" comment="myspell-hi_IN-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521387" comment="myspell-hr_HR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521388" comment="myspell-hu_HU-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521389" comment="myspell-id-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521390" comment="myspell-id_ID-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521391" comment="myspell-it_IT-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521392" comment="myspell-lightproof-en-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521393" comment="myspell-lightproof-hu_HU-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521394" comment="myspell-lightproof-pt_BR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521395" comment="myspell-lightproof-ru_RU-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521396" comment="myspell-lo_LA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521397" comment="myspell-lt_LT-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521398" comment="myspell-lv_LV-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521399" comment="myspell-nb_NO-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521400" comment="myspell-nl_BE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521401" comment="myspell-nl_NL-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521402" comment="myspell-nn_NO-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521403" comment="myspell-no-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521404" comment="myspell-pl_PL-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521405" comment="myspell-pt_AO-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521406" comment="myspell-pt_BR-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521407" comment="myspell-pt_PT-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521408" comment="myspell-ro-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521409" comment="myspell-ro_RO-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521410" comment="myspell-ru_RU-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521411" comment="myspell-sk_SK-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521412" comment="myspell-sl_SI-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521413" comment="myspell-sr-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521414" comment="myspell-sr_CS-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521415" comment="myspell-sr_Latn_CS-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521416" comment="myspell-sr_Latn_RS-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521417" comment="myspell-sr_RS-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521418" comment="myspell-sv_FI-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521419" comment="myspell-sv_SE-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521420" comment="myspell-te-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521421" comment="myspell-te_IN-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521422" comment="myspell-th_TH-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521423" comment="myspell-uk_UA-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521424" comment="myspell-vi-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521425" comment="myspell-vi_VN-20190423-16.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521426" comment="myspell-zu_ZA-20190423-16.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16860" ref_url="https://www.suse.com/security/cve/CVE-2018-16860" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16860/">CVE-2018-16860</cve>
	<bugzilla href="https://bugzilla.suse.com/1134024">SUSE bug 1134024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16862" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16863" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16863" ref_url="https://www.suse.com/security/cve/CVE-2018-16863" source="SUSE CVE"/>
    <description>
    It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16863/">CVE-2018-16863</cve>
	<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SYSTEM-DOWN-BLOG" ref_url="https://www.suse.com/c/stack-clashing-systemd-aka-system-down/" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00043.html" source="SUSE-SU"/>
    <description>
    An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SYSTEM-DOWN-BLOG" ref_url="https://www.suse.com/c/stack-clashing-systemd-aka-system-down/" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00043.html" source="SUSE-SU"/>
    <description>
    An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00043.html" source="SUSE-SU"/>
    <description>
    An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126183">SUSE bug 1126183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16867" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16867" ref_url="https://www.suse.com/security/cve/CVE-2018-16867" source="SUSE CVE"/>
    <description>
    A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16867/">CVE-2018-16867</cve>
	<bugzilla href="https://bugzilla.suse.com/1118641">SUSE bug 1118641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871</cve>
	<bugzilla href="https://bugzilla.suse.com/1137103">SUSE bug 1137103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156320">SUSE bug 1156320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119494">SUSE bug 1119494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522455" comment="qemu-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522456" comment="qemu-block-curl-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522457" comment="qemu-ipxe-1.0.0+-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522458" comment="qemu-kvm-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522459" comment="qemu-seabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522460" comment="qemu-sgabios-8-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522461" comment="qemu-tools-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522462" comment="qemu-vgabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522463" comment="qemu-x86-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16880" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16880" ref_url="https://www.suse.com/security/cve/CVE-2018-16880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16880/">CVE-2018-16880</cve>
	<bugzilla href="https://bugzilla.suse.com/1122767">SUSE bug 1122767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16881" ref_url="https://www.suse.com/security/cve/CVE-2018-16881" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0209-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190209-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00011.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16881/">CVE-2018-16881</cve>
	<bugzilla href="https://bugzilla.suse.com/1123164">SUSE bug 1123164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521595" comment="rsyslog-8.24.0-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16882" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16882" ref_url="https://www.suse.com/security/cve/CVE-2018-16882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions before 4.14.91 and before 4.19.13 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-07"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16882/">CVE-2018-16882</cve>
	<bugzilla href="https://bugzilla.suse.com/1119934">SUSE bug 1119934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16883" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16883" ref_url="https://www.suse.com/security/cve/CVE-2018-16883" source="SUSE CVE"/>
    <description>
    sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "allowed_uids" configuration parameter. If sensitive information were stored in the user directory, this could be inadvertently disclosed to local attackers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16883/">CVE-2018-16883</cve>
	<bugzilla href="https://bugzilla.suse.com/1120089">SUSE bug 1120089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333946" comment="sssd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16885" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16885" ref_url="https://www.suse.com/security/cve/CVE-2018-16885" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16885/">CVE-2018-16885</cve>
	<bugzilla href="https://bugzilla.suse.com/1120258">SUSE bug 1120258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16889" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005910.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00016.html" source="SUSE-SU"/>
    <description>
    Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889</cve>
	<bugzilla href="https://bugzilla.suse.com/1121567">SUSE bug 1121567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521644" comment="ceph-common-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521645" comment="libcephfs2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521646" comment="librados2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521647" comment="libradosstriper1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521648" comment="librbd1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521649" comment="librgw2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521650" comment="python-cephfs-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521651" comment="python-rados-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521652" comment="python-rbd-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521653" comment="python-rgw-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522131" comment="ceph-common-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522132" comment="libcephfs2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522133" comment="librados2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522134" comment="libradosstriper1-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522135" comment="librbd1-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522136" comment="librgw2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522137" comment="python-cephfs-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522138" comment="python-rados-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522139" comment="python-rbd-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522140" comment="python-rgw-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00023.html" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522450" comment="curl-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522451" comment="libcurl4-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522452" comment="libcurl4-32bit-7.60.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17000" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in the function _TIFFmemcmp at tif_unix.c (called from TIFFWriteDirectoryTagTransferfunction) in LibTIFF 4.0.9 allows an attacker to cause a denial-of-service through a crafted tiff file. This vulnerability can be triggered by the executable tiffcp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000</cve>
	<bugzilla href="https://bugzilla.suse.com/1108606">SUSE bug 1108606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115717">SUSE bug 1115717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125113">SUSE bug 1125113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522397" comment="libtiff5-4.0.9-44.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522398" comment="libtiff5-32bit-4.0.9-44.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3588-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue has been discovered in mpruett Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0. A heap-based buffer overflow in Expand3To4Module::run has occurred when running sfconvert.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095</cve>
	<bugzilla href="https://bugzilla.suse.com/1111586">SUSE bug 1111586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520307" comment="audiofile-0.3.6-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520308" comment="libaudiofile1-0.3.6-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520309" comment="libaudiofile1-32bit-0.3.6-11.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17096" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00005.html" source="SUSE-SU"/>
    <description>
    The BPMDetect class in BPMDetect.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096</cve>
	<bugzilla href="https://bugzilla.suse.com/1108630">SUSE bug 1108630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520338" comment="libSoundTouch0-1.7.1-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520339" comment="libSoundTouch0-32bit-1.7.1-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520340" comment="soundtouch-1.7.1-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17097" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00032.html" source="SUSE-SU"/>
    <description>
    The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097</cve>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521774" comment="libSoundTouch0-1.7.1-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521775" comment="libSoundTouch0-32bit-1.7.1-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521776" comment="soundtouch-1.7.1-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17098" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00032.html" source="SUSE-SU"/>
    <description>
    The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (heap corruption from size inconsistency) or possibly have unspecified other impact, as demonstrated by SoundStretch.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098</cve>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521774" comment="libSoundTouch0-1.7.1-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521775" comment="libSoundTouch0-32bit-1.7.1-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521776" comment="soundtouch-1.7.1-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17100" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520255" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520256" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17101" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520255" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520256" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3032-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520130" comment="kernel-default-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520131" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520132" comment="kernel-default-extra-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520136" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17229" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17229" ref_url="https://www.suse.com/security/cve/CVE-2018-17229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17229/">CVE-2018-17229</cve>
	<bugzilla href="https://bugzilla.suse.com/1109175">SUSE bug 1109175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109176">SUSE bug 1109176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17230" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17230" ref_url="https://www.suse.com/security/cve/CVE-2018-17230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17230/">CVE-2018-17230</cve>
	<bugzilla href="https://bugzilla.suse.com/1109176">SUSE bug 1109176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17282" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282</cve>
	<bugzilla href="https://bugzilla.suse.com/1109299">SUSE bug 1109299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17336" ref_url="https://www.suse.com/security/cve/CVE-2018-17336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004755.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00057.html" source="SUSE-SU"/>
    <description>
    UDisks 2.8.0 has a format string vulnerability in udisks_log in udiskslogging.c, allowing attackers to obtain sensitive information (stack contents), cause a denial of service (memory corruption), or possibly have unspecified other impact via a malformed filesystem label, as demonstrated by %d or %n substrings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17336/">CVE-2018-17336</cve>
	<bugzilla href="https://bugzilla.suse.com/1109406">SUSE bug 1109406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334111" comment="udisks2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17407" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3033-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125938">SUSE bug 1125938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512343" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520140" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17466" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17795" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    The function t2p_write_pdf in tiff2pdf.c in LibTIFF 4.0.9 and earlier allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520255" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520256" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17828" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004779.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00066.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in ZZIPlib 0.13.69 allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828</cve>
	<bugzilla href="https://bugzilla.suse.com/1110687">SUSE bug 1110687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520264" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520417" comment="qemu-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520418" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520420" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520423" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521800" comment="qemu-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521801" comment="qemu-block-curl-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521802" comment="qemu-ipxe-1.0.0+-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521803" comment="qemu-kvm-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521804" comment="qemu-seabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521805" comment="qemu-sgabios-8-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521806" comment="qemu-tools-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521807" comment="qemu-vgabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521808" comment="qemu-x86-2.11.2-5.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17962" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520417" comment="qemu-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520418" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520420" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520423" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521800" comment="qemu-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521801" comment="qemu-block-curl-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521802" comment="qemu-ipxe-1.0.0+-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521803" comment="qemu-kvm-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521804" comment="qemu-seabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521805" comment="qemu-sgabios-8-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521806" comment="qemu-tools-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521807" comment="qemu-vgabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521808" comment="qemu-x86-2.11.2-5.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17963" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520417" comment="qemu-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520418" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520420" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520423" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520284" comment="xen-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520285" comment="xen-libs-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520286" comment="xen-libs-32bit-4.9.3_03-3.44.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521800" comment="qemu-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521801" comment="qemu-block-curl-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521802" comment="qemu-ipxe-1.0.0+-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521803" comment="qemu-kvm-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521804" comment="qemu-seabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521805" comment="qemu-sgabios-8-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521806" comment="qemu-tools-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521807" comment="qemu-vgabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521808" comment="qemu-x86-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00040.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in WriteSGIImage in coders/sgi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965</cve>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520238" comment="ImageMagick-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520239" comment="libMagick++-6_Q16-3-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520241" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00020.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePDBImage in coders/pdb.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520238" comment="ImageMagick-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520239" comment="libMagick++-6_Q16-3-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520241" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972</cve>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00020.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016</cve>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520238" comment="ImageMagick-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520239" comment="libMagick++-6_Q16-3-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520241" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18020" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18020" ref_url="https://www.suse.com/security/cve/CVE-2018-18020" source="SUSE CVE"/>
    <description>
    In QPDF 8.2.1, in libqpdf/QPDFWriter.cc, QPDFWriter::unparseObject and QPDFWriter::unparseChild have recursive calls for a long time, which allows remote attackers to cause a denial of service via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18020/">CVE-2018-18020</cve>
	<bugzilla href="https://bugzilla.suse.com/1111016">SUSE bug 1111016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339025" comment="qpdf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18023" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18023" ref_url="https://www.suse.com/security/cve/CVE-2018-18023" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the SVGStripString function of coders/svg.c, which allows attackers to cause a denial of service via a crafted SVG image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18023/">CVE-2018-18023</cve>
	<bugzilla href="https://bugzilla.suse.com/1111068">SUSE bug 1111068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18024" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00020.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-13 Q16, there is an infinite loop in the ReadBMPImage function of the coders/bmp.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520238" comment="ImageMagick-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520239" comment="libMagick++-6_Q16-3-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520241" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18025" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18025" ref_url="https://www.suse.com/security/cve/CVE-2018-18025" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the EncodeImage function of coders/pict.c, which allows attackers to cause a denial of service via a crafted SVG image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18025/">CVE-2018-18025</cve>
	<bugzilla href="https://bugzilla.suse.com/1111070">SUSE bug 1111070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18065" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3447-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQK3YBZP7LLGFOZF2RYGZC5GDDRHRI6/" source="SUSE-SU"/>
    <description>
    _set_key in agent/helpers/table_container.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512467" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512468" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512469" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512470" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512471" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520274" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520275" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520276" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520277" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520278" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18066" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18066" ref_url="https://www.suse.com/security/cve/CVE-2018-18066" source="SUSE CVE"/>
    <description>
    snmp_oid_compare in snmplib/snmp_api.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an unauthenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-18066/">CVE-2018-18066</cve>
	<bugzilla href="https://bugzilla.suse.com/1111123">SUSE bug 1111123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334320" comment="net-snmp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18088" ref_url="https://www.suse.com/security/cve/CVE-2018-18088" source="SUSE CVE"/>
    <description>
    OpenJPEG 2.3.0 has a NULL pointer dereference for "red" in the imagetopnm function of jp2/convert.c
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18088/">CVE-2018-18088</cve>
	<bugzilla href="https://bugzilla.suse.com/1111638">SUSE bug 1111638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18227" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00035.html" source="SUSE-SU"/>
    <description>
    Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520343" comment="kernel-default-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520344" comment="kernel-default-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520345" comment="kernel-default-extra-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520346" comment="kernel-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520347" comment="kernel-macros-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520348" comment="kernel-source-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520349" comment="kernel-syms-4.4.162-94.69.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521793" comment="kernel-default-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521794" comment="kernel-default-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521795" comment="kernel-default-extra-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521796" comment="kernel-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521797" comment="kernel-macros-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521798" comment="kernel-source-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521799" comment="kernel-syms-4.12.14-95.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144621">SUSE bug 1144621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18312" ref_url="https://www.suse.com/security/cve/CVE-2018-18312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-07-08"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18312/">CVE-2018-18312</cve>
	<bugzilla href="https://bugzilla.suse.com/1114675">SUSE bug 1114675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18313" ref_url="https://www.suse.com/security/cve/CVE-2018-18313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18313/">CVE-2018-18313</cve>
	<bugzilla href="https://bugzilla.suse.com/1114681">SUSE bug 1114681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18314" ref_url="https://www.suse.com/security/cve/CVE-2018-18314" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18314/">CVE-2018-18314</cve>
	<bugzilla href="https://bugzilla.suse.com/1114686">SUSE bug 1114686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<bugzilla href="https://bugzilla.suse.com/1118529">SUSE bug 1118529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<bugzilla href="https://bugzilla.suse.com/1118529">SUSE bug 1118529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125396">SUSE bug 1125396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18386" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
    <description>
    drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520343" comment="kernel-default-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520344" comment="kernel-default-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520345" comment="kernel-default-extra-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520346" comment="kernel-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520347" comment="kernel-macros-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520348" comment="kernel-source-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520349" comment="kernel-syms-4.4.162-94.69.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521793" comment="kernel-default-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521794" comment="kernel-default-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521795" comment="kernel-default-extra-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521796" comment="kernel-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521797" comment="kernel-macros-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521798" comment="kernel-source-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521799" comment="kernel-syms-4.12.14-95.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397</cve>
	<bugzilla href="https://bugzilla.suse.com/1117656">SUSE bug 1117656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18438" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
    <description>
    Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438</cve>
	<bugzilla href="https://bugzilla.suse.com/1112185">SUSE bug 1112185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18443" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18443" ref_url="https://www.suse.com/security/cve/CVE-2018-18443" source="SUSE CVE"/>
    <description>
    OpenEXR 2.3.0 has a memory leak in ThreadPool in IlmBase/IlmThread/IlmThreadPool.cpp, as demonstrated by exrmultiview.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18443/">CVE-2018-18443</cve>
	<bugzilla href="https://bugzilla.suse.com/1113454">SUSE bug 1113454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113455">SUSE bug 1113455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334075" comment="openexr is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18444" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18444" ref_url="https://www.suse.com/security/cve/CVE-2018-18444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00089.html" source="SUSE-SU"/>
    <description>
    makeMultiView.cpp in exrmultiview in OpenEXR 2.3.0 has an out-of-bounds write, leading to an assertion failure or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18444/">CVE-2018-18444</cve>
	<bugzilla href="https://bugzilla.suse.com/1113455">SUSE bug 1113455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522007" comment="libIlmImf-Imf_2_1-21-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522008" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522009" comment="openexr-2.1.0-6.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18445" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18445" ref_url="https://www.suse.com/security/cve/CVE-2018-18445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18445/">CVE-2018-18445</cve>
	<bugzilla href="https://bugzilla.suse.com/1112372">SUSE bug 1112372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521793" comment="kernel-default-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521794" comment="kernel-default-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521795" comment="kernel-default-extra-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521796" comment="kernel-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521797" comment="kernel-macros-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521798" comment="kernel-source-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521799" comment="kernel-syms-4.12.14-95.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18492" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18493" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18494" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18498" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18500" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18501" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18505" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html" source="SUSE-SU"/>
    <description>
    An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18510" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18510" ref_url="https://www.suse.com/security/cve/CVE-2018-18510" source="SUSE CVE"/>
    <description>
    The about:crashcontent and about:crashparent pages can be triggered by web content. These pages are used to crash the loaded page or the browser for test purposes. This issue allows for a non-persistent denial of service (DOS) attack by a malicious site which links to these pages. This vulnerability affects Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18510/">CVE-2018-18510</cve>
	<bugzilla href="https://bugzilla.suse.com/1133645">SUSE bug 1133645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    Cross-origin images can be read from a canvas element in violation of the same-origin policy using the transferFromImageBitmap method. *Note: This only affects Firefox 65. Previous versions are unaffected.*. This vulnerability affects Firefox &lt; 65.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511</cve>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125396">SUSE bug 1125396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4054-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
    <description>
    There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520396" comment="ImageMagick-6.8.8.1-71.93.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520397" comment="libMagick++-6_Q16-3-6.8.8.1-71.93.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520398" comment="libMagickCore-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520399" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.93.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520400" comment="libMagickWand-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18557" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3947-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00050.html" source="SUSE-SU"/>
    <description>
    LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557</cve>
	<bugzilla href="https://bugzilla.suse.com/1113094">SUSE bug 1113094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520382" comment="libtiff5-4.0.9-44.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520383" comment="libtiff5-32bit-4.0.9-44.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18559" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18559" ref_url="https://www.suse.com/security/cve/CVE-2018-18559" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18559/">CVE-2018-18559</cve>
	<bugzilla href="https://bugzilla.suse.com/1112859">SUSE bug 1112859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112921">SUSE bug 1112921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18651" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18651" ref_url="https://www.suse.com/security/cve/CVE-2018-18651" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.00. catalog-&gt;getNumPages() in AcroForm.cc allows attackers to launch a denial of service (hang caused by large loop) via a specific pdf file, as demonstrated by pdftohtml. This is mainly caused by a large number after the /Count field in the file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18651/">CVE-2018-18651</cve>
	<bugzilla href="https://bugzilla.suse.com/1113983">SUSE bug 1113983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3947-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00050.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520382" comment="libtiff5-4.0.9-44.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520383" comment="libtiff5-32bit-4.0.9-44.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18690" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690</cve>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520343" comment="kernel-default-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520344" comment="kernel-default-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520345" comment="kernel-default-extra-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520346" comment="kernel-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520347" comment="kernel-macros-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520348" comment="kernel-source-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520349" comment="kernel-syms-4.4.162-94.69.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18710" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520343" comment="kernel-default-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520344" comment="kernel-default-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520345" comment="kernel-default-extra-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520346" comment="kernel-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520347" comment="kernel-macros-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520348" comment="kernel-source-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520349" comment="kernel-syms-4.4.162-94.69.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521793" comment="kernel-default-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521794" comment="kernel-default-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521795" comment="kernel-default-extra-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521796" comment="kernel-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521797" comment="kernel-macros-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521798" comment="kernel-source-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521799" comment="kernel-syms-4.12.14-95.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520417" comment="qemu-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520418" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520420" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520423" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520407" comment="xen-4.9.3_03-3.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520408" comment="xen-libs-4.9.3_03-3.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520409" comment="xen-libs-32bit-4.9.3_03-3.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521800" comment="qemu-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521801" comment="qemu-block-curl-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521802" comment="qemu-ipxe-1.0.0+-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521803" comment="qemu-kvm-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521804" comment="qemu-seabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521805" comment="qemu-sgabios-8-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521806" comment="qemu-tools-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521807" comment="qemu-vgabios-1.11.0-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521808" comment="qemu-x86-2.11.2-5.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18883" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883</cve>
	<bugzilla href="https://bugzilla.suse.com/1114405">SUSE bug 1114405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520407" comment="xen-4.9.3_03-3.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520408" comment="xen-libs-4.9.3_03-3.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520409" comment="xen-libs-32bit-4.9.3_03-3.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18915" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18915" ref_url="https://www.suse.com/security/cve/CVE-2018-18915" source="SUSE CVE"/>
    <description>
    There is an infinite loop in the Exiv2::Image::printIFDStructure function of image.cpp in Exiv2 0.27-RC1. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18915/">CVE-2018-18915</cve>
	<bugzilla href="https://bugzilla.suse.com/1114690">SUSE bug 1114690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18928" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18928" ref_url="https://www.suse.com/security/cve/CVE-2018-18928" source="SUSE CVE"/>
    <description>
    International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18928/">CVE-2018-18928</cve>
	<bugzilla href="https://bugzilla.suse.com/1114629">SUSE bug 1114629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334242" comment="icu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18954" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18954" ref_url="https://www.suse.com/security/cve/CVE-2018-18954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    The pnv_lpc_do_eccb function in hw/ppc/pnv_lpc.c in Qemu before 3.1 allows out-of-bounds write or read access to PowerNV memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18954/">CVE-2018-18954</cve>
	<bugzilla href="https://bugzilla.suse.com/1114957">SUSE bug 1114957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522455" comment="qemu-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522456" comment="qemu-block-curl-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522457" comment="qemu-ipxe-1.0.0+-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522458" comment="qemu-kvm-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522459" comment="qemu-seabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522460" comment="qemu-sgabios-8-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522461" comment="qemu-tools-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522462" comment="qemu-vgabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522463" comment="qemu-x86-2.11.2-5.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19208" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19208" ref_url="https://www.suse.com/security/cve/CVE-2018-19208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3812-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3886-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In libwpd 0.10.2, there is a NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp that will lead to a denial of service attack. This is related to WPXTable.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19208/">CVE-2018-19208</cve>
	<bugzilla href="https://bugzilla.suse.com/1115713">SUSE bug 1115713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520365" comment="libwpd-0_10-10-0.10.2-2.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19210" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005260.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service attack, as demonstrated by tiffset.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210</cve>
	<bugzilla href="https://bugzilla.suse.com/1108606">SUSE bug 1108606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115717">SUSE bug 1115717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3967-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183967-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00022.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520387" comment="libncurses5-5.9-61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520388" comment="libncurses5-32bit-5.9-61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520389" comment="libncurses6-5.9-61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520390" comment="libncurses6-32bit-5.9-61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520391" comment="ncurses-devel-5.9-61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520392" comment="ncurses-utils-5.9-61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520393" comment="tack-5.9-61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520394" comment="terminfo-5.9-61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520395" comment="terminfo-base-5.9-61.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19217" ref_url="https://www.suse.com/security/cve/CVE-2018-19217" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In ncurses, possibly a 6.x version, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack. NOTE: the original report stated version 6.1, but the issue did not reproduce for that version according to the maintainer or a reliable third-party.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19217/">CVE-2018-19217</cve>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334357" comment="ncurses is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116726">SUSE bug 1116726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522455" comment="qemu-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522456" comment="qemu-block-curl-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522457" comment="qemu-ipxe-1.0.0+-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522458" comment="qemu-kvm-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522459" comment="qemu-seabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522460" comment="qemu-sgabios-8-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522461" comment="qemu-tools-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522462" comment="qemu-vgabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522463" comment="qemu-x86-2.11.2-5.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19406" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19406" ref_url="https://www.suse.com/security/cve/CVE-2018-19406" source="SUSE CVE"/>
    <description>
    kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19406/">CVE-2018-19406</cve>
	<bugzilla href="https://bugzilla.suse.com/1116855">SUSE bug 1116855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19407" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19416" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005490.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in sysstat 12.1.1. The remap_struct function in sa_common.c has an out-of-bounds read during a memmove call, as demonstrated by sadf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416</cve>
	<bugzilla href="https://bugzilla.suse.com/1117001">SUSE bug 1117001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521196" comment="sysstat-12.0.2-10.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117279">SUSE bug 1117279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522455" comment="qemu-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522456" comment="qemu-block-curl-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522457" comment="qemu-ipxe-1.0.0+-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522458" comment="qemu-kvm-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522459" comment="qemu-seabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522460" comment="qemu-sgabios-8-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522461" comment="qemu-tools-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522462" comment="qemu-vgabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522463" comment="qemu-x86-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19517" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005490.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in sysstat 12.1.1. The remap_struct function in sa_common.c has an out-of-bounds read during a memset call, as demonstrated by sadf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517</cve>
	<bugzilla href="https://bugzilla.suse.com/1117260">SUSE bug 1117260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521196" comment="sysstat-12.0.2-10.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19519" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00058.html" source="SUSE-SU"/>
    <description>
    In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519</cve>
	<bugzilla href="https://bugzilla.suse.com/1117267">SUSE bug 1117267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520426" comment="tcpdump-4.9.2-14.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 2.0.14. There is an access violation in the function jas_image_readcmpt in libjasper/base/jas_image.c, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539</cve>
	<bugzilla href="https://bugzilla.suse.com/1117511">SUSE bug 1117511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522238" comment="libjasper1-1.900.14-195.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522239" comment="libjasper1-32bit-1.900.14-195.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00023.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16. There is a heap-based buffer overflow of size 1 in the function jas_icctxtdesc_input in libjasper/base/jas_icc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540</cve>
	<bugzilla href="https://bugzilla.suse.com/1117508">SUSE bug 1117508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522238" comment="libjasper1-1.900.14-195.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522239" comment="libjasper1-32bit-1.900.14-195.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00023.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16. There is a heap-based buffer over-read of size 8 in the function jas_image_depalettize in libjasper/base/jas_image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541</cve>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119411">SUSE bug 1119411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522238" comment="libjasper1-1.900.14-195.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522239" comment="libjasper1-32bit-1.900.14-195.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19542" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function jp2_decode in libjasper/jp2/jp2_dec.c, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542</cve>
	<bugzilla href="https://bugzilla.suse.com/1117505">SUSE bug 1117505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522238" comment="libjasper1-1.900.14-195.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522239" comment="libjasper1-32bit-1.900.14-195.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19565" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19565" ref_url="https://www.suse.com/security/cve/CVE-2018-19565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
    <description>
    A buffer over-read in crop_masked_pixels in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code or leak private information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-10-31"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19565/">CVE-2018-19565</cve>
	<bugzilla href="https://bugzilla.suse.com/1117622">SUSE bug 1117622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19566" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19566" ref_url="https://www.suse.com/security/cve/CVE-2018-19566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
    <description>
    A heap buffer over-read in parse_tiff_ifd in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code or leak private information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19566/">CVE-2018-19566</cve>
	<bugzilla href="https://bugzilla.suse.com/1117517">SUSE bug 1117517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19567" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19567" ref_url="https://www.suse.com/security/cve/CVE-2018-19567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
    <description>
    A floating point exception in parse_tiff_ifd in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-10-31"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19567/">CVE-2018-19567</cve>
	<bugzilla href="https://bugzilla.suse.com/1117512">SUSE bug 1117512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19568" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19568" ref_url="https://www.suse.com/security/cve/CVE-2018-19568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
    <description>
    A floating point exception in kodak_radc_load_raw in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19568/">CVE-2018-19568</cve>
	<bugzilla href="https://bugzilla.suse.com/1117436">SUSE bug 1117436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19591" ref_url="https://www.suse.com/security/cve/CVE-2018-19591" source="SUSE CVE"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19591/">CVE-2018-19591</cve>
	<bugzilla href="https://bugzilla.suse.com/1117603">SUSE bug 1117603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19607" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607</cve>
	<bugzilla href="https://bugzilla.suse.com/1117513">SUSE bug 1117513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19623" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the LBMPDM dissector could crash. In addition, a remote attacker could write arbitrary data to any memory locations before the packet-scoped memory. This was addressed in epan/dissectors/packet-lbmpdm.c by disallowing certain negative values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19624" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19625" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the dissection engine could crash. This was addressed in epan/tvbuff_composite.c by preventing a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19626" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the DCOM dissector could crash. This was addressed in epan/dissectors/packet-dcom.c by adding '\0' termination.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19627" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by adjusting a buffer boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19628" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19628" ref_url="https://www.suse.com/security/cve/CVE-2018-19628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4, the ZigBee ZCL dissector could crash. This was addressed in epan/dissectors/packet-zbee-zcl-lighting.c by preventing a divide-by-zero error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19628/">CVE-2018-19628</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19636" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19637" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19638" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19655" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19655" ref_url="https://www.suse.com/security/cve/CVE-2018-19655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in the find_green() function of dcraw through 9.28, as used in ufraw-batch and many other products, may allow a remote attacker to cause a control-flow hijack, denial-of-service, or unspecified other impact via a maliciously crafted raw photo file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19655/">CVE-2018-19655</cve>
	<bugzilla href="https://bugzilla.suse.com/1117896">SUSE bug 1117896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19661" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19661" ref_url="https://www.suse.com/security/cve/CVE-2018-19661" source="SUSE CVE"/>
    <description>
    An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2ulaw_array in ulaw.c that will lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-19661/">CVE-2018-19661</cve>
	<bugzilla href="https://bugzilla.suse.com/1117906">SUSE bug 1117906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117925">SUSE bug 1117925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334031" comment="libsndfile is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19662" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19662" ref_url="https://www.suse.com/security/cve/CVE-2018-19662" source="SUSE CVE"/>
    <description>
    An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2alaw_array in alaw.c that will lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-19662/">CVE-2018-19662</cve>
	<bugzilla href="https://bugzilla.suse.com/1117925">SUSE bug 1117925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334031" comment="libsndfile is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19664" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19664" ref_url="https://www.suse.com/security/cve/CVE-2018-19664" source="SUSE CVE"/>
    <description>
    libjpeg-turbo 2.0.1 has a heap-based buffer over-read in the put_pixel_rows function in wrbmp.c, as demonstrated by djpeg.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19664/">CVE-2018-19664</cve>
	<bugzilla href="https://bugzilla.suse.com/1117890">SUSE bug 1117890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334089" comment="libjpeg-turbo is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334090" comment="libjpeg62-turbo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<bugzilla href="https://bugzilla.suse.com/1117749">SUSE bug 1117749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0019-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00004.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<bugzilla href="https://bugzilla.suse.com/1118274">SUSE bug 1118274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119056">SUSE bug 1119056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521590" comment="libpolkit0-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521591" comment="libpolkit0-32bit-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521592" comment="polkit-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521593" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19824" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521793" comment="kernel-default-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521794" comment="kernel-default-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521795" comment="kernel-default-extra-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521796" comment="kernel-devel-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521797" comment="kernel-macros-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521798" comment="kernel-source-4.12.14-95.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521799" comment="kernel-syms-4.12.14-95.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19841" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841</cve>
	<bugzilla href="https://bugzilla.suse.com/1120929">SUSE bug 1120929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19854" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19854" ref_url="https://www.suse.com/security/cve/CVE-2018-19854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19854/">CVE-2018-19854</cve>
	<bugzilla href="https://bugzilla.suse.com/1118428">SUSE bug 1118428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19870" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00080.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. A malformed GIF image causes a NULL pointer dereference in QGifHandler resulting in a segmentation fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870</cve>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522604" comment="libQt5Concurrent5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522605" comment="libQt5Core5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522606" comment="libQt5DBus5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522607" comment="libQt5Gui5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522608" comment="libQt5Network5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522609" comment="libQt5OpenGL5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522610" comment="libQt5PrintSupport5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522611" comment="libQt5Sql5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522612" comment="libQt5Sql5-mysql-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522613" comment="libQt5Sql5-postgresql-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522614" comment="libQt5Sql5-sqlite-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522615" comment="libQt5Sql5-unixODBC-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522616" comment="libQt5Test5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522617" comment="libQt5Widgets5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522618" comment="libQt5Xml5-5.6.2-6.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00080.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt 5.11. A malformed PPM image causes a division by zero and a crash in qppmhandler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872</cve>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522604" comment="libQt5Concurrent5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522605" comment="libQt5Core5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522606" comment="libQt5DBus5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522607" comment="libQt5Gui5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522608" comment="libQt5Network5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522609" comment="libQt5OpenGL5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522610" comment="libQt5PrintSupport5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522611" comment="libQt5Sql5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522612" comment="libQt5Sql5-mysql-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522613" comment="libQt5Sql5-postgresql-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522614" comment="libQt5Sql5-sqlite-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522615" comment="libQt5Sql5-unixODBC-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522616" comment="libQt5Test5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522617" comment="libQt5Widgets5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522618" comment="libQt5Xml5-5.6.2-6.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer overflow via BMP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520430" comment="libQt5Concurrent5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520431" comment="libQt5Core5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520432" comment="libQt5DBus5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520433" comment="libQt5Gui5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520434" comment="libQt5Network5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520435" comment="libQt5OpenGL5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520436" comment="libQt5PrintSupport5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520437" comment="libQt5Sql5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520438" comment="libQt5Sql5-mysql-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520439" comment="libQt5Sql5-postgresql-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520440" comment="libQt5Sql5-sqlite-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520441" comment="libQt5Sql5-unixODBC-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520442" comment="libQt5Test5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520443" comment="libQt5Widgets5-5.6.2-6.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520444" comment="libQt5Xml5-5.6.2-6.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19876" ref_url="https://www.suse.com/security/cve/CVE-2018-19876" source="SUSE CVE"/>
    <description>
    cairo 1.16.0, in cairo_ft_apply_variations() in cairo-ft-font.c, would free memory using a free function incompatible with WebKit's fastMalloc, leading to an application crash with a "free(): invalid pointer" error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19876/">CVE-2018-19876</cve>
	<bugzilla href="https://bugzilla.suse.com/1118587">SUSE bug 1118587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334276" comment="cairo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19963" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19963" ref_url="https://www.suse.com/security/cve/CVE-2018-19963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19963/">CVE-2018-19963</cve>
	<bugzilla href="https://bugzilla.suse.com/1115043">SUSE bug 1115043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19964" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19964" ref_url="https://www.suse.com/security/cve/CVE-2018-19964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19964/">CVE-2018-19964</cve>
	<bugzilla href="https://bugzilla.suse.com/1115044">SUSE bug 1115044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20030" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20123" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123" source="SUSE CVE"/>
    <description>
    pvrdma_realize in hw/rdma/vmw/pvrdma_main.c in QEMU has a Memory leak after an initialisation error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123</cve>
	<bugzilla href="https://bugzilla.suse.com/1119437">SUSE bug 1119437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119438">SUSE bug 1119438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124" source="SUSE CVE"/>
    <description>
    hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124</cve>
	<bugzilla href="https://bugzilla.suse.com/1119840">SUSE bug 1119840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119841">SUSE bug 1119841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125" source="SUSE CVE"/>
    <description>
    hw/rdma/vmw/pvrdma_cmd.c in QEMU allows attackers to cause a denial of service (NULL pointer dereference or excessive memory allocation) in create_cq_ring or create_qp_rings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125</cve>
	<bugzilla href="https://bugzilla.suse.com/1119989">SUSE bug 1119989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
    <description>
    hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126</cve>
	<bugzilla href="https://bugzilla.suse.com/1119991">SUSE bug 1119991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522361" comment="qemu-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522362" comment="qemu-block-curl-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522363" comment="qemu-ipxe-1.0.0+-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522364" comment="qemu-kvm-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522365" comment="qemu-seabios-1.11.0-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522366" comment="qemu-sgabios-8-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522367" comment="qemu-tools-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522368" comment="qemu-vgabios-1.11.0-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522369" comment="qemu-x86-2.11.2-5.23.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20184" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20184" ref_url="https://www.suse.com/security/cve/CVE-2018-20184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00000.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20181209 Q8, there is a heap-based buffer overflow in the WriteTGAImage function of tga.c, which allows attackers to cause a denial of service via a crafted image file, because the number of rows or columns can exceed the pixel-dimension restrictions of the TGA specification.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20184/">CVE-2018-20184</cve>
	<bugzilla href="https://bugzilla.suse.com/1119822">SUSE bug 1119822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20185" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20185" ref_url="https://www.suse.com/security/cve/CVE-2018-20185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20181209 Q8 on 32-bit platforms, there is a heap-based buffer over-read in the ReadBMPImage function of bmp.c, which allows attackers to cause a denial of service via a crafted bmp image file. This only affects GraphicsMagick installations with customized BMP limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20185/">CVE-2018-20185</cve>
	<bugzilla href="https://bugzilla.suse.com/1119823">SUSE bug 1119823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20189" ref_url="https://www.suse.com/security/cve/CVE-2018-20189" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:4313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00000.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.3.31, the ReadDIBImage function of coders/dib.c has a vulnerability allowing a crash and denial of service via a dib file that is crafted to appear with direct pixel values and also colormapping (which is not available beyond 8-bits/sample), and therefore lacks indexes initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20189/">CVE-2018-20189</cve>
	<bugzilla href="https://bugzilla.suse.com/1119790">SUSE bug 1119790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191" source="SUSE CVE"/>
    <description>
    hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191</cve>
	<bugzilla href="https://bugzilla.suse.com/1119979">SUSE bug 1119979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119980">SUSE bug 1119980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20216" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216" source="SUSE CVE"/>
    <description>
    QEMU can have an infinite loop in hw/rdma/vmw/pvrdma_dev_ring.c because return values are not checked (and -1 is mishandled).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216</cve>
	<bugzilla href="https://bugzilla.suse.com/1119984">SUSE bug 1119984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119985">SUSE bug 1119985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0113-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005342.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00033.html" source="SUSE-SU"/>
    <description>
    A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521121" comment="krb5-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521122" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521123" comment="krb5-client-1.12.5-40.31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20330" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20330" ref_url="https://www.suse.com/security/cve/CVE-2018-20330" source="SUSE CVE"/>
    <description>
    The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20330/">CVE-2018-20330</cve>
	<bugzilla href="https://bugzilla.suse.com/1120646">SUSE bug 1120646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334089" comment="libjpeg-turbo is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334090" comment="libjpeg62-turbo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20337" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20337" ref_url="https://www.suse.com/security/cve/CVE-2018-20337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00045.html" source="SUSE-SU"/>
    <description>
    There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20337/">CVE-2018-20337</cve>
	<bugzilla href="https://bugzilla.suse.com/1120519">SUSE bug 1120519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20340" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20340" ref_url="https://www.suse.com/security/cve/CVE-2018-20340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRDOETNQVM5LVLJRZMNGQEBNRFW4ZWEV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6NOI7O3I53SFL6DVLZH5VWF6EO4AISA/" source="SUSE-SU"/>
    <description>
    Yubico libu2f-host 1.1.6 contains unchecked buffers in devs.c, which could enable a malicious token to exploit a buffer overflow. An attacker could use this to attempt to execute malicious code using a crafted USB device masquerading as a security token on a computer where the affected library is currently in use. It is not possible to perform this attack with a genuine YubiKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20340/">CVE-2018-20340</cve>
	<bugzilla href="https://bugzilla.suse.com/1124781">SUSE bug 1124781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521934" comment="libu2f-host0-1.1.6-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521935" comment="pam_u2f-1.0.8-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0788-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190788-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html" source="SUSE-SU"/>
    <description>
    SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120335">SUSE bug 1120335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131918">SUSE bug 1131918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148893">SUSE bug 1148893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169664">SUSE bug 1169664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20363" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20363" ref_url="https://www.suse.com/security/cve/CVE-2018-20363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00045.html" source="SUSE-SU"/>
    <description>
    LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20363/">CVE-2018-20363</cve>
	<bugzilla href="https://bugzilla.suse.com/1120498">SUSE bug 1120498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521184" comment="libraw9-0.15.4-30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20364" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20364" ref_url="https://www.suse.com/security/cve/CVE-2018-20364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00045.html" source="SUSE-SU"/>
    <description>
    LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20364/">CVE-2018-20364</cve>
	<bugzilla href="https://bugzilla.suse.com/1120499">SUSE bug 1120499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521184" comment="libraw9-0.15.4-30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20365" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20365" ref_url="https://www.suse.com/security/cve/CVE-2018-20365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00045.html" source="SUSE-SU"/>
    <description>
    LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20365/">CVE-2018-20365</cve>
	<bugzilla href="https://bugzilla.suse.com/1120498">SUSE bug 1120498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120499">SUSE bug 1120499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120500">SUSE bug 1120500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521184" comment="libraw9-0.15.4-30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20406" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20449" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20449" ref_url="https://www.suse.com/security/cve/CVE-2018-20449" source="SUSE CVE"/>
    <description>
    The hidma_chan_stats function in drivers/dma/qcom/hidma_dbg.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "callback=" lines in a debugfs file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20449/">CVE-2018-20449</cve>
	<bugzilla href="https://bugzilla.suse.com/1131646">SUSE bug 1131646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20467" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20483" ref_url="https://www.suse.com/security/cve/CVE-2018-20483" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00020.html" source="SUSE-SU"/>
    <description>
    set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20483/">CVE-2018-20483</cve>
	<bugzilla href="https://bugzilla.suse.com/1120382">SUSE bug 1120382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334123" comment="wget is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20505" ref_url="https://www.suse.com/security/cve/CVE-2018-20505" source="SUSE CVE"/>
    <description>
    SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20505/">CVE-2018-20505</cve>
	<bugzilla href="https://bugzilla.suse.com/1131560">SUSE bug 1131560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html" source="SUSE-SU"/>
    <description>
    SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<bugzilla href="https://bugzilla.suse.com/1131560">SUSE bug 1131560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20509" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20509" ref_url="https://www.suse.com/security/cve/CVE-2018-20509" source="SUSE CVE"/>
    <description>
    The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20509/">CVE-2018-20509</cve>
	<bugzilla href="https://bugzilla.suse.com/1134198">SUSE bug 1134198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20510" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20510" ref_url="https://www.suse.com/security/cve/CVE-2018-20510" source="SUSE CVE"/>
    <description>
    The print_binder_transaction_ilocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "*from *code *flags" lines in a debugfs file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20510/">CVE-2018-20510</cve>
	<bugzilla href="https://bugzilla.suse.com/1134174">SUSE bug 1134174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20511" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20511" ref_url="https://www.suse.com/security/cve/CVE-2018-20511" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-04"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20511/">CVE-2018-20511</cve>
	<bugzilla href="https://bugzilla.suse.com/1120388">SUSE bug 1120388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20532" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334124" comment="libsolv is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20533" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334124" comment="libsolv is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20534" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** There is an illegal address access at ext/testcase.c in libsolv.a in libsolv through 0.7.2 that will cause a denial of service. NOTE: third parties dispute this issue stating that the issue affects the test suite and not the underlying library. It cannot be exploited in any real-world application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20544" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20544" ref_url="https://www.suse.com/security/cve/CVE-2018-20544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html" source="SUSE-SU"/>
    <description>
    There is floating point exception at caca/dither.c (function caca_dither_bitmap) in libcaca 0.99.beta19.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20544/">CVE-2018-20544</cve>
	<bugzilla href="https://bugzilla.suse.com/1120502">SUSE bug 1120502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522263" comment="libcaca0-0.99.beta18-14.3.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20545" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20545" ref_url="https://www.suse.com/security/cve/CVE-2018-20545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html" source="SUSE-SU"/>
    <description>
    There is an illegal WRITE memory access at common-image.c (function load_image) in libcaca 0.99.beta19 for 4bpp data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20545/">CVE-2018-20545</cve>
	<bugzilla href="https://bugzilla.suse.com/1120470">SUSE bug 1120470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120584">SUSE bug 1120584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120589">SUSE bug 1120589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522263" comment="libcaca0-0.99.beta18-14.3.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20546" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20546" ref_url="https://www.suse.com/security/cve/CVE-2018-20546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html" source="SUSE-SU"/>
    <description>
    There is an illegal READ memory access at caca/dither.c (function get_rgba_default) in libcaca 0.99.beta19 for the default bpp case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20546/">CVE-2018-20546</cve>
	<bugzilla href="https://bugzilla.suse.com/1120503">SUSE bug 1120503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120504">SUSE bug 1120504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522263" comment="libcaca0-0.99.beta18-14.3.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20547" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20547" ref_url="https://www.suse.com/security/cve/CVE-2018-20547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html" source="SUSE-SU"/>
    <description>
    There is an illegal READ memory access at caca/dither.c (function get_rgba_default) in libcaca 0.99.beta19 for 24bpp data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20547/">CVE-2018-20547</cve>
	<bugzilla href="https://bugzilla.suse.com/1120503">SUSE bug 1120503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120504">SUSE bug 1120504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522263" comment="libcaca0-0.99.beta18-14.3.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20548" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20548" ref_url="https://www.suse.com/security/cve/CVE-2018-20548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html" source="SUSE-SU"/>
    <description>
    There is an illegal WRITE memory access at common-image.c (function load_image) in libcaca 0.99.beta19 for 1bpp data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20548/">CVE-2018-20548</cve>
	<bugzilla href="https://bugzilla.suse.com/1120470">SUSE bug 1120470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120584">SUSE bug 1120584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120589">SUSE bug 1120589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522263" comment="libcaca0-0.99.beta18-14.3.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20549" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20549" ref_url="https://www.suse.com/security/cve/CVE-2018-20549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2745-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html" source="SUSE-SU"/>
    <description>
    There is an illegal WRITE memory access at caca/file.c (function caca_file_read) in libcaca 0.99.beta19.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20549/">CVE-2018-20549</cve>
	<bugzilla href="https://bugzilla.suse.com/1120470">SUSE bug 1120470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120584">SUSE bug 1120584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120589">SUSE bug 1120589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522263" comment="libcaca0-0.99.beta18-14.3.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20551" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20551" ref_url="https://www.suse.com/security/cve/CVE-2018-20551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    A reachable Object::getString assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to construction of invalid rich media annotation assets in the AnnotRichMedia class in Annot.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-12-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20551/">CVE-2018-20551</cve>
	<bugzilla href="https://bugzilla.suse.com/1120496">SUSE bug 1120496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20584" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20584" ref_url="https://www.suse.com/security/cve/CVE-2018-20584" source="SUSE CVE"/>
    <description>
    JasPer 2.0.14 allows remote attackers to cause a denial of service (application hang) via an attempted conversion to the jp2 format.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20584/">CVE-2018-20584</cve>
	<bugzilla href="https://bugzilla.suse.com/1120806">SUSE bug 1120806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20662" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20662" ref_url="https://www.suse.com/security/cve/CVE-2018-20662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    In Poppler 0.72.0, PDFDoc::setup in PDFDoc.cc allows attackers to cause a denial-of-service (application crash caused by Object.h SIGABRT, because of a wrong return value from PDFDoc::setup) by crafting a PDF file in which an xref data structure is mishandled during extractPDFSubtype processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20662/">CVE-2018-20662</cve>
	<bugzilla href="https://bugzilla.suse.com/1120939">SUSE bug 1120939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120956">SUSE bug 1120956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
    <description>
    An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00041.html" source="SUSE-SU"/>
    <description>
    In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20751" ref_url="https://www.suse.com/security/cve/CVE-2018-20751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005711.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in crop_page in PoDoFo 0.9.6. For a crafted PDF document, pPage-&gt;GetObject()-&gt;GetDictionary().AddKey(PdfName("MediaBox"),var) can be problematic due to the function GetObject() being called for the pPage NULL pointer object. The value of pPage at this point is 0x0, which causes a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20751/">CVE-2018-20751</cve>
	<bugzilla href="https://bugzilla.suse.com/1124357">SUSE bug 1124357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521960" comment="libpodofo0_9_2-0.9.2-3.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784</cve>
	<bugzilla href="https://bugzilla.suse.com/1126703">SUSE bug 1126703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20786" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20786" ref_url="https://www.suse.com/security/cve/CVE-2018-20786" source="SUSE CVE"/>
    <description>
    libvterm through 0+bzr726, as used in Vim and other products, mishandles certain out-of-memory conditions, leading to a denial of service (application crash), related to screen.c, state.c, and vterm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20786/">CVE-2018-20786</cve>
	<bugzilla href="https://bugzilla.suse.com/1126750">SUSE bug 1126750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126752">SUSE bug 1126752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334305" comment="vim is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20797" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20797" ref_url="https://www.suse.com/security/cve/CVE-2018-20797" source="SUSE CVE"/>
    <description>
    An issue was discovered in PoDoFo 0.9.6. There is an attempted excessive memory allocation in PoDoFo::podofo_calloc in base/PdfMemoryManagement.cpp when called from PoDoFo::PdfPredictorDecoder::PdfPredictorDecoder in base/PdfFiltersPrivate.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20797/">CVE-2018-20797</cve>
	<bugzilla href="https://bugzilla.suse.com/1127514">SUSE bug 1127514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338990" comment="podofo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20815" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
    <description>
    In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521765" comment="qemu-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521766" comment="qemu-block-curl-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521767" comment="qemu-ipxe-1.0.0+-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521768" comment="qemu-kvm-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521769" comment="qemu-seabios-1.10.2-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521770" comment="qemu-sgabios-8-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521771" comment="qemu-tools-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521772" comment="qemu-vgabios-1.10.2-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521773" comment="qemu-x86-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521172" comment="xen-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521173" comment="xen-libs-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521174" comment="xen-libs-32bit-4.9.4_04-3.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521845" comment="xen-4.11.1_06-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521846" comment="xen-libs-4.11.1_06-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521847" comment="xen-libs-32bit-4.11.1_06-2.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20839" ref_url="https://www.suse.com/security/cve/CVE-2018-20839" source="SUSE CVE"/>
    <description>
    systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20839/">CVE-2018-20839</cve>
	<bugzilla href="https://bugzilla.suse.com/1135604">SUSE bug 1135604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00104.html" source="SUSE-SU"/>
    <description>
    In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843</cve>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521956" comment="expat-2.1.0-21.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521957" comment="libexpat1-2.1.0-21.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521958" comment="libexpat1-32bit-2.1.0-21.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522289" comment="libpython3_4m1_0-3.4.6-25.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522290" comment="python3-3.4.6-25.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522291" comment="python3-base-3.4.6-25.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522292" comment="python3-curses-3.4.6-25.34.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20854" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20854" ref_url="https://www.suse.com/security/cve/CVE-2018-20854" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20. drivers/phy/mscc/phy-ocelot-serdes.c has an off-by-one error with a resultant ctrl-&gt;phys out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20854/">CVE-2018-20854</cve>
	<bugzilla href="https://bugzilla.suse.com/1143038">SUSE bug 1143038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20855" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522045" comment="kernel-default-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522046" comment="kernel-default-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522047" comment="kernel-default-extra-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522048" comment="kernel-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522049" comment="kernel-macros-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522050" comment="kernel-source-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522051" comment="kernel-syms-4.12.14-95.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20961" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20961" ref_url="https://www.suse.com/security/cve/CVE-2018-20961" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20961/">CVE-2018-20961</cve>
	<bugzilla href="https://bugzilla.suse.com/1144823">SUSE bug 1144823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20969" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20969" ref_url="https://www.suse.com/security/cve/CVE-2018-20969" source="SUSE CVE"/>
    <description>
    do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-20969/">CVE-2018-20969</cve>
	<bugzilla href="https://bugzilla.suse.com/1146398">SUSE bug 1146398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333929" comment="patch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21008" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010" source="SUSE CVE"/>
    <description>
    OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010</cve>
	<bugzilla href="https://bugzilla.suse.com/1149789">SUSE bug 1149789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21029" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21029" ref_url="https://www.suse.com/security/cve/CVE-2018-21029" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-21029/">CVE-2018-21029</cve>
	<bugzilla href="https://bugzilla.suse.com/1155539">SUSE bug 1155539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519017" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519018" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519019" comment="libmysqlclient_r18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519020" comment="libmysqlclient_r18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519021" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519022" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519023" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519017" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519018" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519019" comment="libmysqlclient_r18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519020" comment="libmysqlclient_r18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519021" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519022" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519023" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519017" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519018" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519019" comment="libmysqlclient_r18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519020" comment="libmysqlclient_r18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519021" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519022" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519023" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519017" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519018" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519019" comment="libmysqlclient_r18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519020" comment="libmysqlclient_r18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519021" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519022" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519023" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519017" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519018" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519019" comment="libmysqlclient_r18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519020" comment="libmysqlclient_r18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519021" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519022" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519023" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519017" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519018" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519019" comment="libmysqlclient_r18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519020" comment="libmysqlclient_r18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519021" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519022" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519023" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2759" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101675">SUSE bug 1101675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2777" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101637">SUSE bug 1101637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2810" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2825" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<bugzilla href="https://bugzilla.suse.com/1090196">SUSE bug 1090196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334125" comment="java-1_7_0-openjdk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333949" comment="java-1_8_0-openjdk is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2826" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<bugzilla href="https://bugzilla.suse.com/1090197">SUSE bug 1090197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334125" comment="java-1_7_0-openjdk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333949" comment="java-1_8_0-openjdk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334125" comment="java-1_7_0-openjdk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333949" comment="java-1_8_0-openjdk is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2938" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2940" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2941" ref_url="https://www.suse.com/security/cve/CVE-2018-2941" source="SUSE CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2941/">CVE-2018-2941</cve>
	<bugzilla href="https://bugzilla.suse.com/1101648">SUSE bug 1101648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333949" comment="java-1_8_0-openjdk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2942" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2942" ref_url="https://www.suse.com/security/cve/CVE-2018-2942" source="SUSE CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL). Supported versions that are affected are Java SE: 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2942/">CVE-2018-2942</cve>
	<bugzilla href="https://bugzilla.suse.com/1101650">SUSE bug 1101650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333949" comment="java-1_8_0-openjdk is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-13"/>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-15"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101653">SUSE bug 1101653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2972" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2972" ref_url="https://www.suse.com/security/cve/CVE-2018-2972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2972/">CVE-2018-2972</cve>
	<bugzilla href="https://bugzilla.suse.com/1101655">SUSE bug 1101655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2973" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3162" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162</cve>
	<bugzilla href="https://bugzilla.suse.com/1112415">SUSE bug 1112415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3173" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173</cve>
	<bugzilla href="https://bugzilla.suse.com/1112386">SUSE bug 1112386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120714">SUSE bug 1120714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185</cve>
	<bugzilla href="https://bugzilla.suse.com/1112384">SUSE bug 1112384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3200" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200</cve>
	<bugzilla href="https://bugzilla.suse.com/1112404">SUSE bug 1112404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3277" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277</cve>
	<bugzilla href="https://bugzilla.suse.com/1112391">SUSE bug 1112391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3284" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284</cve>
	<bugzilla href="https://bugzilla.suse.com/1112377">SUSE bug 1112377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3613" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00059.html" source="SUSE-SU"/>
    <description>
    Logic issue in variable service module for EDK II/UDK2018/UDK2017/UDK2015 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613</cve>
	<bugzilla href="https://bugzilla.suse.com/1115916">SUSE bug 1115916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521809" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620" source="SUSE CVE"/>
		<reference ref_id="L1TF-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-the-l1-terminal-fault-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="TID000019216" ref_url="https://www.suse.com/support/kb/doc/?id=000019216" source="SUSE-SU"/>
		<reference ref_id="TID000019230" ref_url="https://www.suse.com/support/kb/doc/?id=000019230" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7023077" ref_url="https://www.suse.com/support/kb/doc/?id=7023077" source="SUSE-SU"/>
		<reference ref_id="TID7023078" ref_url="https://www.suse.com/support/kb/doc/?id=7023078" source="SUSE-SU"/>
		<reference ref_id="TID7023312" ref_url="https://www.suse.com/support/kb/doc/?id=7023312" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090340">SUSE bug 1090340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519954" comment="kernel-default-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519955" comment="kernel-default-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519956" comment="kernel-default-extra-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519957" comment="kernel-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519958" comment="kernel-macros-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519959" comment="kernel-source-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519960" comment="kernel-syms-4.4.143-94.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3630" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630</cve>
	<bugzilla href="https://bugzilla.suse.com/1127822">SUSE bug 1127822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522489" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.8.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639" source="SUSE CVE"/>
		<reference ref_id="BLOG-SPECTREV4" ref_url="https://www.suse.com/c/suse-addresses-spectre-variant-4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="TID000019189" ref_url="https://www.suse.com/support/kb/doc/?id=000019189" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022937" ref_url="https://www.suse.com/support/kb/doc/?id=7022937" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085235">SUSE bug 1085235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085308">SUSE bug 1085308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102640">SUSE bug 1102640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519880" comment="libvirt-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519881" comment="libvirt-admin-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519882" comment="libvirt-client-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519883" comment="libvirt-daemon-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519884" comment="libvirt-daemon-config-network-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519885" comment="libvirt-daemon-config-nwfilter-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519886" comment="libvirt-daemon-driver-interface-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519887" comment="libvirt-daemon-driver-libxl-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519888" comment="libvirt-daemon-driver-lxc-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519889" comment="libvirt-daemon-driver-network-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519890" comment="libvirt-daemon-driver-nodedev-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519891" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519892" comment="libvirt-daemon-driver-qemu-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519893" comment="libvirt-daemon-driver-secret-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519894" comment="libvirt-daemon-driver-storage-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519895" comment="libvirt-daemon-driver-storage-core-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519896" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519897" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519898" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519899" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519900" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519901" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519902" comment="libvirt-daemon-lxc-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519903" comment="libvirt-daemon-qemu-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519904" comment="libvirt-daemon-xen-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519905" comment="libvirt-doc-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519906" comment="libvirt-libs-3.3.0-5.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520290" comment="qemu-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520291" comment="qemu-block-curl-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520292" comment="qemu-ipxe-1.0.0-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520293" comment="qemu-kvm-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520294" comment="qemu-seabios-1.10.2-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520295" comment="qemu-sgabios-8-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520296" comment="qemu-tools-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520297" comment="qemu-vgabios-1.10.2-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520298" comment="qemu-x86-2.9.1-6.19.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521021" comment="xen-4.9.2_06-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521022" comment="xen-libs-4.9.2_06-3.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521023" comment="xen-libs-32bit-4.9.2_06-3.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512625" comment="ucode-intel-20180807a-13.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="TID000019198" ref_url="https://www.suse.com/support/kb/doc/?id=000019198" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022950" ref_url="https://www.suse.com/support/kb/doc/?id=7022950" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00058.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175912">SUSE bug 1175912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512625" comment="ucode-intel-20180807a-13.35.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646" source="SUSE CVE"/>
		<reference ref_id="L1TF-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-the-l1-terminal-fault-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2410-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="TID000019216" ref_url="https://www.suse.com/support/kb/doc/?id=000019216" source="SUSE-SU"/>
		<reference ref_id="TID000019230" ref_url="https://www.suse.com/support/kb/doc/?id=000019230" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7023077" ref_url="https://www.suse.com/support/kb/doc/?id=7023077" source="SUSE-SU"/>
		<reference ref_id="TID7023078" ref_url="https://www.suse.com/support/kb/doc/?id=7023078" source="SUSE-SU"/>
		<reference ref_id="TID7023312" ref_url="https://www.suse.com/support/kb/doc/?id=7023312" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104365">SUSE bug 1104365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106548">SUSE bug 1106548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519954" comment="kernel-default-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519955" comment="kernel-default-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519956" comment="kernel-default-extra-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519957" comment="kernel-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519958" comment="kernel-macros-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519959" comment="kernel-source-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519960" comment="kernel-syms-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520284" comment="xen-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520285" comment="xen-libs-4.9.3_03-3.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520286" comment="xen-libs-32bit-4.9.3_03-3.44.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2099-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182099-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="TID000019231" ref_url="https://www.suse.com/support/kb/doc/?id=000019231" source="SUSE-SU"/>
		<reference ref_id="TID000019261" ref_url="https://www.suse.com/support/kb/doc/?id=000019261" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7023076" ref_url="https://www.suse.com/support/kb/doc/?id=7023076" source="SUSE-SU"/>
		<reference ref_id="TID7023167" ref_url="https://www.suse.com/support/kb/doc/?id=7023167" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
    <description>
    System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095241">SUSE bug 1095241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100555">SUSE bug 1100555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519726" comment="kernel-default-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519727" comment="kernel-default-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519728" comment="kernel-default-extra-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519729" comment="kernel-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519730" comment="kernel-macros-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519731" comment="kernel-source-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519732" comment="kernel-syms-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519821" comment="xen-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519822" comment="xen-libs-4.9.2_08-3.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519823" comment="xen-libs-32bit-4.9.2_08-3.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4088" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088</cve>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4096" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096</cve>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4101" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4113" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves a JavaScriptCore function in the "WebKit" component. It allows attackers to trigger an assertion failure by leveraging improper array indexing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4114" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4117" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102530">SUSE bug 1102530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4118" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4119" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4121" ref_url="https://www.suse.com/security/cve/CVE-2018-4121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4121/">CVE-2018-4121</cve>
	<bugzilla href="https://bugzilla.suse.com/1092278">SUSE bug 1092278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4129" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4133" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the "WebKit" component. A Safari cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4146" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows attackers to cause a denial of service (memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4161" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4162" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4163" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4165" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165</cve>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519856" comment="cups-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519857" comment="cups-client-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519858" comment="cups-libs-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519859" comment="cups-libs-32bit-1.7.5-20.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105281">SUSE bug 1105281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519856" comment="cups-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519857" comment="cups-client-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519858" comment="cups-libs-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519859" comment="cups-libs-32bit-1.7.5-20.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In macOS High Sierra before 10.13.5, an access issue was addressed with additional sandbox restrictions on CUPS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105281">SUSE bug 1105281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519856" comment="cups-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519857" comment="cups-client-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519858" comment="cups-libs-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519859" comment="cups-libs-32bit-1.7.5-20.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In macOS High Sierra before 10.13.5, an access issue was addressed with additional sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519856" comment="cups-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519857" comment="cups-client-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519858" comment="cups-libs-1.7.5-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519859" comment="cups-libs-32bit-1.7.5-20.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4190" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190</cve>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4197" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4199" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199</cve>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200</cve>
	<bugzilla href="https://bugzilla.suse.com/1092280">SUSE bug 1092280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204</cve>
	<bugzilla href="https://bugzilla.suse.com/1092279">SUSE bug 1092279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4208" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4210" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, an array indexing issue existed in the handling of a function in javascript core. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4212" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4213" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218</cve>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4222" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222</cve>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4232" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to overwrite cookies via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232</cve>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4233" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233</cve>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4246" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages type confusion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4261" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4262" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 11.4.1, iCloud for Windows before 7.6, multiple memory corruption issues were addressed with improved memory handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4263" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4264" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4265" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4266" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A race condition was addressed with additional validation. This issue affected versions prior toiVersions prior to: OS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4267" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4270" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4272" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4273" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved input validation. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4278" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 11.4.1, iCloud for Windows before 7.6, sound fetched through audio elements may be exfiltrated cross-origin. This issue was addressed with improved audio taint tracking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4284" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4299" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4306" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4309" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4312" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4314" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4315" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4316" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4317" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4318" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4319" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue affected versions prior to iOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4328" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4345" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4361" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory consumption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4372" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4373" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4375" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4376" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4378" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4382" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4386" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4416" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4437" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4438" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4441" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4442" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4443" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4464" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4700" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00039.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-4300. Reason: This candidate is a duplicate of CVE-2018-4300. Notes: All CVE users should reference CVE-2018-4300 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700</cve>
	<bugzilla href="https://bugzilla.suse.com/1115750">SUSE bug 1115750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131480">SUSE bug 1131480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520413" comment="cups-1.7.5-20.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520414" comment="cups-client-1.7.5-20.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520415" comment="cups-libs-1.7.5-20.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520416" comment="cups-libs-32bit-1.7.5-20.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4868" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4868" ref_url="https://www.suse.com/security/cve/CVE-2018-4868" source="SUSE CVE"/>
    <description>
    The Exiv2::Jp2Image::readMetadata function in jp2image.cpp in Exiv2 0.26 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4868/">CVE-2018-4868</cve>
	<bugzilla href="https://bugzilla.suse.com/1074502">SUSE bug 1074502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5089" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5091" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5096" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Thunderbird &lt; 52.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5097" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5098" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5099" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5102" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5103" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5104" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5117" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5124" ref_url="https://www.suse.com/security/cve/CVE-2018-5124" source="SUSE CVE"/>
    <description>
    Unsanitized output in the browser UI leaves HTML tags in place and can result in arbitrary code execution in Firefox before version 58.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5124/">CVE-2018-5124</cve>
	<bugzilla href="https://bugzilla.suse.com/1078314">SUSE bug 1078314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5129" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
    <description>
    When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5131" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5144" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5145" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox &lt; 59.0.1, Firefox ESR &lt; 52.7.2, and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180395">SUSE bug 1180395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519033" comment="libvorbis0-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519034" comment="libvorbis0-32bit-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519035" comment="libvorbisenc2-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519036" comment="libvorbisenc2-32bit-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519037" comment="libvorbisfile3-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519038" comment="libvorbisfile3-32bit-1.3.3-10.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5147" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
    <description>
    The libtremor library has the same flaw as CVE-2018-5146. This library is used by Firefox in place of libvorbis on Android and ARM platforms. This vulnerability affects Firefox ESR &lt; 52.7.2 and Firefox &lt; 59.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5148" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0843-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00109.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.7.3 and Firefox &lt; 59.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5151" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 59. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5152" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5153" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If websocket data is sent with mixed text and binary in a single message, the binary data can be corrupted. This can result in an out-of-bounds read with the read memory sent to the originating server in response. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
    <description>
    Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5160" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    WebRTC can use a "WrappedI420Buffer" pixel buffer but the owning image object can be freed while it is still in use. This can result in the WebRTC encoder using uninitialized memory, leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5163" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5164" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the "multipart/x-mixed-replace" MIME type. This could allow for script to run where CSP should block it, allowing for cross-site scripting (XSS) and other attacks. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5165" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    In 32-bit versions of Firefox, the Adobe Flash plugin setting for "Enable Adobe Flash protected mode" is unchecked by default even though the Adobe Flash sandbox is actually enabled. The displayed state is the reverse of the true setting, resulting in user confusion. This could cause users to select this setting intending to activate it and inadvertently turn protections off. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5166" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    WebExtensions can use request redirection and a "filterReponseData" filter to bypass host permission settings to redirect network traffic and access content from a host for which they do not have explicit user permission. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5167" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    The web console and JavaScript debugger do not sanitize all output that can be hyperlinked. Both will display "chrome:" links as active, clickable hyperlinks in their output. Web sites should not be able to directly link to internal chrome pages. Additionally, the JavaScript debugger will display "javascript:" links, which users could be tricked into clicking by malicious sites. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If manipulated hyperlinked text with "chrome:" URL contained in it is dragged and dropped on the "home" icon, the home page can be reset to include a normally-unlinkable chrome page as one of the home page tabs. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5172" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    The Live Bookmarks page and the PDF viewer can run injected script content if a user pastes script from the clipboard into them while viewing RSS feeds or PDF files. This could allow a malicious site to socially engineer a user to copy and paste malicious script content that could then run with the context of either page but does not allow for privilege escalation. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5173" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    The filename appearing in the "Downloads" panel improperly renders some Unicode characters, allowing for the file name to be spoofed. This can be used to obscure the file extension of potentially executable files from user view in the panel. Note: the dialog to open the file will show the full, correct filename and whether it is executable or not. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5174" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    In the Windows 10 April 2018 Update, Windows Defender SmartScreen honors the "SEE_MASK_FLAG_NO_UI" flag associated with downloaded files and will not show any UI. Files that are unknown and potentially dangerous will be allowed to run because SmartScreen will not prompt the user for a decision, and if the user is offline all files will be allowed to be opened because Windows won't prompt the user to ask what to do. Firefox incorrectly sets this flag when downloading files, leading to less secure behavior from SmartScreen. Note: this issue only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5175" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    A mechanism to bypass Content Security Policy (CSP) protections on sites that have a "script-src" policy of "'strict-dynamic'". If a target website contains an HTML injection flaw an attacker could inject a reference to a copy of the "require.js" library that is part of Firefox's Developer Tools, and then use a known technique using that library to bypass the CSP restrictions on executing injected scripts. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5176" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running this code in the context of the JSON Viewer. This can allow for the theft of cookies and authorization tokens which are accessible to that context. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5177" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in XSLT during number formatting where a negative buffer size may be allocated in some instances, leading to a buffer overflow and crash if it occurs. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5179" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00035.html" source="SUSE-SU"/>
    <description>
    A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during WebGL operations. While this results in a potentially exploitable crash, the vulnerability is limited because the memory is freed and reused in a brief window of time during the freeing of the same callstack. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5181" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equivalent "file:" URL. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5244" ref_url="https://www.suse.com/security/cve/CVE-2018-5244" source="SUSE CVE"/>
    <description>
    In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5244/">CVE-2018-5244</cve>
	<bugzilla href="https://bugzilla.suse.com/1073961">SUSE bug 1073961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074966">SUSE bug 1074966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadRLAImage in coders/rla.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5248" ref_url="https://www.suse.com/security/cve/CVE-2018-5248" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5248/">CVE-2018-5248</cve>
	<bugzilla href="https://bugzilla.suse.com/1074968">SUSE bug 1074968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5295" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5295" ref_url="https://www.suse.com/security/cve/CVE-2018-5295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    In PoDoFo 0.9.5, there is an integer overflow in the PdfXRefStreamParserObject::ParseStream function (base/PdfXRefStreamParserObject.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5295/">CVE-2018-5295</cve>
	<bugzilla href="https://bugzilla.suse.com/1075026">SUSE bug 1075026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5296" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5296" ref_url="https://www.suse.com/security/cve/CVE-2018-5296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    In PoDoFo 0.9.5, there is an uncontrolled memory allocation in the PdfParser::ReadXRefSubsection function (base/PdfParser.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5296/">CVE-2018-5296</cve>
	<bugzilla href="https://bugzilla.suse.com/1075021">SUSE bug 1075021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5308" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5308" ref_url="https://www.suse.com/security/cve/CVE-2018-5308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    PoDoFo 0.9.5 does not properly validate memcpy arguments in the PdfMemoryOutputStream::Write function (base/PdfOutputStream.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service or possibly unspecified other impact via a crafted pdf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5308/">CVE-2018-5308</cve>
	<bugzilla href="https://bugzilla.suse.com/1075772">SUSE bug 1075772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5309" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5309" ref_url="https://www.suse.com/security/cve/CVE-2018-5309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    In PoDoFo 0.9.5, there is an integer overflow in the PdfObjectStreamParserObject::ReadObjectsFromStream function (base/PdfObjectStreamParserObject.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5309/">CVE-2018-5309</cve>
	<bugzilla href="https://bugzilla.suse.com/1075322">SUSE bug 1075322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5334" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518768" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518769" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518770" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518771" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518772" comment="wireshark-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518773" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5335" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518768" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518769" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518770" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518771" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518772" comment="wireshark-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518773" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518768" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518769" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518770" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518771" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518772" comment="wireshark-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518773" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5357" ref_url="https://www.suse.com/security/cve/CVE-2018-5357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-22 Q16 has memory leaks in the ReadDCMImage function in coders/dcm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5357/">CVE-2018-5357</cve>
	<bugzilla href="https://bugzilla.suse.com/1075821">SUSE bug 1075821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095726">SUSE bug 1095726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5358" ref_url="https://www.suse.com/security/cve/CVE-2018-5358" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-22 Q16 has memory leaks in the EncodeImageAttributes function in coders/json.c, as demonstrated by the ReadPSDLayersInternal function in coders/psd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5358/">CVE-2018-5358</cve>
	<bugzilla href="https://bugzilla.suse.com/1075819">SUSE bug 1075819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5383" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0427-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383</cve>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521632" comment="kernel-firmware-20170530-21.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521633" comment="ucode-amd-20170530-21.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101792">SUSE bug 1101792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390" source="SUSE CVE"/>
		<reference ref_id="BLOG-SEGMENTSMACK" ref_url="https://www.suse.com/c/suse-addresses-segmentsmack-attack/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="TID000019282" ref_url="https://www.suse.com/support/kb/doc/?id=000019282" source="SUSE-SU"/>
		<reference ref_id="TID7023243" ref_url="https://www.suse.com/support/kb/doc/?id=7023243" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
    <description>
    Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519954" comment="kernel-default-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519955" comment="kernel-default-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519956" comment="kernel-default-extra-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519957" comment="kernel-devel-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519958" comment="kernel-macros-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519959" comment="kernel-source-4.4.143-94.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519960" comment="kernel-syms-4.4.143-94.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0645-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190645-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108654">SUSE bug 1108654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114071">SUSE bug 1114071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121102">SUSE bug 1121102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134140">SUSE bug 1134140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181460">SUSE bug 1181460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
    <description>
    Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116195">SUSE bug 1116195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520373" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520405" comment="libopenssl0_9_8-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520406" comment="libopenssl0_9_8-32bit-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520374" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520375" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520376" comment="openssl-1.0.2j-60.46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521787" comment="libopenssl-1_0_0-devel-1.0.2p-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520405" comment="libopenssl0_9_8-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520406" comment="libopenssl0_9_8-32bit-0.9.8j-106.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521788" comment="libopenssl1_0_0-1.0.2p-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521789" comment="libopenssl1_0_0-32bit-1.0.2p-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521790" comment="openssl-1_0_0-1.0.2p-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.3.27, there is an infinite loop and application hang in the ReadBMPImage function (coders/bmp.c). Remote attackers could leverage this vulnerability to cause a denial of service via an image file with a crafted bit-field mask value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5709" ref_url="https://www.suse.com/security/cve/CVE-2018-5709" source="SUSE CVE"/>
    <description>
    An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry-&gt;n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5709/">CVE-2018-5709</cve>
	<bugzilla href="https://bugzilla.suse.com/1076229">SUSE bug 1076229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132051">SUSE bug 1132051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5710" ref_url="https://www.suse.com/security/cve/CVE-2018-5710" source="SUSE CVE"/>
    <description>
    An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key Distribution Center (KDC), which allows remote authenticated users to cause a denial of service (NULL pointer dereference) via a modified kadmin client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5710/">CVE-2018-5710</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0316-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00114.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00116.html" source="SUSE-SU"/>
    <description>
    gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518799" comment="gd-2.1.0-24.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518800" comment="gd-32bit-2.1.0-24.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00006.html" source="SUSE-SU"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519116" comment="krb5-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519117" comment="krb5-32bit-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519118" comment="krb5-client-1.12.5-40.23.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00006.html" source="SUSE-SU"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519116" comment="krb5-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519117" comment="krb5-32bit-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519118" comment="krb5-client-1.12.5-40.23.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0827-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00106.html" source="SUSE-SU"/>
    <description>
    Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -&gt; 4.1-ESV-R15, 4.2.0 -&gt; 4.2.8, 4.3.0 -&gt; 4.3.6, 4.4.0
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519047" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519048" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0827-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00106.html" source="SUSE-SU"/>
    <description>
    A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -&gt; 4.1-ESV-R15, 4.2.0 -&gt; 4.2.8, 4.3.0 -&gt; 4.3.6, 4.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519047" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519048" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5734" ref_url="https://www.suse.com/security/cve/CVE-2018-5734" source="SUSE CVE"/>
    <description>
    While handling a particular type of malformed packet BIND erroneously selects a SERVFAIL rcode instead of a FORMERR rcode. If the receiving view has the SERVFAIL cache feature enabled, this can trigger an assertion failure in badcache.c when the request doesn't contain all of the expected information. Affects BIND 9.10.5-S1 to 9.10.5-S4, 9.10.6-S1, 9.10.6-S2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5734/">CVE-2018-5734</cve>
	<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5735" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5735" ref_url="https://www.suse.com/security/cve/CVE-2018-5735" source="SUSE CVE"/>
    <description>
    The Debian backport of the fix for CVE-2017-3137 leads to assertion failure in validator.c:1858; Affects Debian versions 9.9.5.dfsg-9+deb8u15; 9.9.5.dfsg-9+deb8u18; 9.10.3.dfsg.P4-12.3+deb9u5; 9.11.5.P4+dfsg-5.1 No ISC releases are affected. Other packages from other distributions who did similar backports for the fix for 2017-3137 may also be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5735/">CVE-2018-5735</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5736" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5736" ref_url="https://www.suse.com/security/cve/CVE-2018-5736" source="SUSE CVE"/>
    <description>
    An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession. This defect could be deliberately exercised by an attacker who is permitted to cause a vulnerable server to initiate zone transfers (for example: by sending valid NOTIFY messages), causing the named process to exit after failing the assertion test. Affects BIND 9.12.0 and 9.12.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5736/">CVE-2018-5736</cve>
	<bugzilla href="https://bugzilla.suse.com/1093448">SUSE bug 1093448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093449">SUSE bug 1093449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5737" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5737" ref_url="https://www.suse.com/security/cve/CVE-2018-5737" source="SUSE CVE"/>
    <description>
    A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive negative caching can in some cases cause undesirable behavior from named, such as a recursion loop or excessive logging. Deliberate exploitation of this condition could cause operational problems depending on the particular manifestation -- either degradation or denial of service. Affects BIND 9.12.0 and 9.12.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5737/">CVE-2018-5737</cve>
	<bugzilla href="https://bugzilla.suse.com/1093448">SUSE bug 1093448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093449">SUSE bug 1093449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5738" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5738" ref_url="https://www.suse.com/security/cve/CVE-2018-5738" source="SUSE CVE"/>
    <description>
    Change #4777 (introduced in October 2017) introduced an unforeseen issue in releases which were issued after that date, affecting which clients are permitted to make recursive queries to a BIND nameserver. The intended (and documented) behavior is that if an operator has not specified a value for the "allow-recursion" setting, it SHOULD default to one of the following: none, if "recursion no;" is set in named.conf; a value inherited from the "allow-query-cache" or "allow-query" settings IF "recursion yes;" (the default for that setting) AND match lists are explicitly set for "allow-query-cache" or "allow-query" (see the BIND9 Administrative Reference Manual section 6.2 for more details); or the intended default of "allow-recursion {localhost; localnets;};" if "recursion yes;" is in effect and no values are explicitly set for "allow-query-cache" or "allow-query". However, because of the regression introduced by change #4777, it is possible when "recursion yes;" is in effect and no match list values are provided for "allow-query-cache" or "allow-query" for the setting of "allow-recursion" to inherit a setting of all hosts from the "allow-query" setting default, improperly permitting recursion to all clients. Affects BIND 9.9.12, 9.10.7, 9.11.3, 9.12.0-&gt;9.12.1-P2, the development release 9.13.0, and also releases 9.9.12-S1, 9.10.7-S1, 9.11.3-S1, and 9.11.3-S2 from BIND 9 Supported Preview Edition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5738/">CVE-2018-5738</cve>
	<bugzilla href="https://bugzilla.suse.com/1096864">SUSE bug 1096864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    "deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0-&gt;9.8.8, 9.9.0-&gt;9.9.13, 9.10.0-&gt;9.10.8, 9.11.0-&gt;9.11.4, 9.12.0-&gt;9.12.2, 9.13.0-&gt;9.13.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522222" comment="bind-utils-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522223" comment="libbind9-160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522224" comment="libdns169-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522225" comment="libirs160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522226" comment="libisc166-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522227" comment="libisc166-32bit-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522228" comment="libisccc160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522229" comment="libisccfg160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522230" comment="liblwres160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522231" comment="python-bind-9.11.2-3.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.6, 9.12.0 -&gt; 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -&gt; 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -&gt; 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522222" comment="bind-utils-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522223" comment="libbind9-160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522224" comment="libdns169-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522225" comment="libirs160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522226" comment="libisc166-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522227" comment="libisc166-32bit-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522228" comment="libisccc160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522229" comment="libisccfg160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522230" comment="liblwres160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522231" comment="python-bind-9.11.2-3.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5744" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5744" ref_url="https://www.suse.com/security/cve/CVE-2018-5744" source="SUSE CVE"/>
    <description>
    A failure to free memory can occur when processing messages having a specific combination of EDNS options. Versions affected are: BIND 9.10.7 -&gt; 9.10.8-P1, 9.11.3 -&gt; 9.11.5-P1, 9.12.0 -&gt; 9.12.3-P1, and versions 9.10.7-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5744/">CVE-2018-5744</cve>
	<bugzilla href="https://bugzilla.suse.com/1126066">SUSE bug 1126066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    "managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P1, 9.12.0 -&gt; 9.12.3-P1, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522222" comment="bind-utils-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522223" comment="libbind9-160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522224" comment="libdns169-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522225" comment="libirs160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522226" comment="libisc166-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522227" comment="libisc166-32bit-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522228" comment="libisccc160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522229" comment="libisccfg160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522230" comment="liblwres160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522231" comment="python-bind-9.11.2-3.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0322-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00120.html" source="SUSE-SU"/>
    <description>
    qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518858" comment="libvirt-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518859" comment="libvirt-client-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518860" comment="libvirt-client-32bit-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518861" comment="libvirt-daemon-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518862" comment="libvirt-daemon-config-network-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518863" comment="libvirt-daemon-config-nwfilter-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518864" comment="libvirt-daemon-driver-interface-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518865" comment="libvirt-daemon-driver-libxl-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518866" comment="libvirt-daemon-driver-lxc-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518867" comment="libvirt-daemon-driver-network-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518868" comment="libvirt-daemon-driver-nodedev-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518869" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518870" comment="libvirt-daemon-driver-qemu-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518871" comment="libvirt-daemon-driver-secret-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518872" comment="libvirt-daemon-driver-storage-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518873" comment="libvirt-daemon-lxc-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518874" comment="libvirt-daemon-qemu-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518875" comment="libvirt-daemon-xen-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518876" comment="libvirt-doc-2.0.0-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520086" comment="libvirt-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520087" comment="libvirt-admin-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520088" comment="libvirt-client-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520089" comment="libvirt-daemon-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520090" comment="libvirt-daemon-config-network-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520091" comment="libvirt-daemon-config-nwfilter-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520092" comment="libvirt-daemon-driver-interface-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520093" comment="libvirt-daemon-driver-libxl-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520094" comment="libvirt-daemon-driver-lxc-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520095" comment="libvirt-daemon-driver-network-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520096" comment="libvirt-daemon-driver-nodedev-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520097" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520098" comment="libvirt-daemon-driver-qemu-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520099" comment="libvirt-daemon-driver-secret-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520100" comment="libvirt-daemon-driver-storage-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520101" comment="libvirt-daemon-driver-storage-core-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520102" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520103" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520104" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520105" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520106" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520107" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520108" comment="libvirt-daemon-lxc-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520109" comment="libvirt-daemon-qemu-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520110" comment="libvirt-daemon-xen-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520111" comment="libvirt-doc-3.3.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520112" comment="libvirt-libs-3.3.0-5.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003619.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0643-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00026.html" source="SUSE-SU"/>
    <description>
    The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518763" comment="rsync-3.1.0-13.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5772" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5772" ref_url="https://www.suse.com/security/cve/CVE-2018-5772" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is a segmentation fault caused by uncontrolled recursion in the Exiv2::Image::printIFDStructure function in the image.cpp file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5772/">CVE-2018-5772</cve>
	<bugzilla href="https://bugzilla.suse.com/1076579">SUSE bug 1076579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5783" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5783" ref_url="https://www.suse.com/security/cve/CVE-2018-5783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005711.html" source="SUSE-SU"/>
    <description>
    In PoDoFo 0.9.5, there is an uncontrolled memory allocation in the PoDoFo::PdfVecObjects::Reserve function (base/PdfVecObjects.h). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted pdf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5783/">CVE-2018-5783</cve>
	<bugzilla href="https://bugzilla.suse.com/1076962">SUSE bug 1076962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521960" comment="libpodofo0_9_2-0.9.2-3.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00025.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784</cve>
	<bugzilla href="https://bugzilla.suse.com/1081690">SUSE bug 1081690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520887" comment="libtiff5-4.0.9-44.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520888" comment="libtiff5-32bit-4.0.9-44.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5800" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5800" ref_url="https://www.suse.com/security/cve/CVE-2018-5800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0731-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00063.html" source="SUSE-SU"/>
    <description>
    An off-by-one error within the "LibRaw::kodak_ycbcr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5800/">CVE-2018-5800</cve>
	<bugzilla href="https://bugzilla.suse.com/1084691">SUSE bug 1084691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520261" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5801" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5801" ref_url="https://www.suse.com/security/cve/CVE-2018-5801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0731-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00063.html" source="SUSE-SU"/>
    <description>
    An error within the "LibRaw::unpack()" function (src/libraw_cxx.cpp) in LibRaw versions prior to 0.18.7 can be exploited to trigger a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5801/">CVE-2018-5801</cve>
	<bugzilla href="https://bugzilla.suse.com/1084690">SUSE bug 1084690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520261" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5802" ref_url="https://www.suse.com/security/cve/CVE-2018-5802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0731-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00063.html" source="SUSE-SU"/>
    <description>
    An error within the "kodak_radc_load_raw()" function (internal/dcraw_common.cpp) related to the "buf" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5802/">CVE-2018-5802</cve>
	<bugzilla href="https://bugzilla.suse.com/1084688">SUSE bug 1084688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520261" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5804" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5804" ref_url="https://www.suse.com/security/cve/CVE-2018-5804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00003.html" source="SUSE-SU"/>
    <description>
    A type confusion error within the "identify()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a division by zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5804/">CVE-2018-5804</cve>
	<bugzilla href="https://bugzilla.suse.com/1097975">SUSE bug 1097975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5805" ref_url="https://www.suse.com/security/cve/CVE-2018-5805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00072.html" source="SUSE-SU"/>
    <description>
    A boundary error within the "quicktake_100_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5805/">CVE-2018-5805</cve>
	<bugzilla href="https://bugzilla.suse.com/1097973">SUSE bug 1097973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521594" comment="libraw9-0.15.4-27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5806" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5806" ref_url="https://www.suse.com/security/cve/CVE-2018-5806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00072.html" source="SUSE-SU"/>
    <description>
    An error within the "leaf_hdr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5806/">CVE-2018-5806</cve>
	<bugzilla href="https://bugzilla.suse.com/1097974">SUSE bug 1097974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521594" comment="libraw9-0.15.4-27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5807" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5807" ref_url="https://www.suse.com/security/cve/CVE-2018-5807" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00032.html" source="SUSE-SU"/>
    <description>
    An error within the "samsung_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5807/">CVE-2018-5807</cve>
	<bugzilla href="https://bugzilla.suse.com/1103361">SUSE bug 1103361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5808" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5808" ref_url="https://www.suse.com/security/cve/CVE-2018-5808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190002-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00072.html" source="SUSE-SU"/>
    <description>
    An error within the "find_green()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5808/">CVE-2018-5808</cve>
	<bugzilla href="https://bugzilla.suse.com/1117896">SUSE bug 1117896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118891">SUSE bug 1118891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118894">SUSE bug 1118894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521594" comment="libraw9-0.15.4-27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5809" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5809" ref_url="https://www.suse.com/security/cve/CVE-2018-5809" source="SUSE CVE"/>
    <description>
    An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5809/">CVE-2018-5809</cve>
	<bugzilla href="https://bugzilla.suse.com/1118891">SUSE bug 1118891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118894">SUSE bug 1118894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5810" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5810" ref_url="https://www.suse.com/security/cve/CVE-2018-5810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00032.html" source="SUSE-SU"/>
    <description>
    An error within the "rollei_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5810/">CVE-2018-5810</cve>
	<bugzilla href="https://bugzilla.suse.com/1103353">SUSE bug 1103353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118894">SUSE bug 1118894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520261" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5811" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5811" ref_url="https://www.suse.com/security/cve/CVE-2018-5811" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00032.html" source="SUSE-SU"/>
    <description>
    An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5811/">CVE-2018-5811</cve>
	<bugzilla href="https://bugzilla.suse.com/1103359">SUSE bug 1103359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5812" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5812" ref_url="https://www.suse.com/security/cve/CVE-2018-5812" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00032.html" source="SUSE-SU"/>
    <description>
    An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to trigger a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-5812/">CVE-2018-5812</cve>
	<bugzilla href="https://bugzilla.suse.com/1103360">SUSE bug 1103360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5813" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5813" ref_url="https://www.suse.com/security/cve/CVE-2018-5813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00003.html" source="SUSE-SU"/>
    <description>
    An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5813/">CVE-2018-5813</cve>
	<bugzilla href="https://bugzilla.suse.com/1103200">SUSE bug 1103200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520261" comment="libraw9-0.15.4-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5814" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5815" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5815" ref_url="https://www.suse.com/security/cve/CVE-2018-5815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00003.html" source="SUSE-SU"/>
    <description>
    An integer overflow error within the "parse_qt()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5815/">CVE-2018-5815</cve>
	<bugzilla href="https://bugzilla.suse.com/1103206">SUSE bug 1103206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5816" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5816" ref_url="https://www.suse.com/security/cve/CVE-2018-5816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00003.html" source="SUSE-SU"/>
    <description>
    An integer overflow error within the "identify()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This vulnerability is caused due to an incomplete fix of CVE-2018-5804).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5816/">CVE-2018-5816</cve>
	<bugzilla href="https://bugzilla.suse.com/1097975">SUSE bug 1097975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334039" comment="libraw is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5817" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5817" ref_url="https://www.suse.com/security/cve/CVE-2018-5817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00045.html" source="SUSE-SU"/>
    <description>
    A type confusion error within the "unpacked_load_raw()" function within LibRaw versions prior to 0.19.1 (internal/dcraw_common.cpp) can be exploited to trigger an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5817/">CVE-2018-5817</cve>
	<bugzilla href="https://bugzilla.suse.com/1120515">SUSE bug 1120515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521184" comment="libraw9-0.15.4-30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5818" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5818" ref_url="https://www.suse.com/security/cve/CVE-2018-5818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An error within the "parse_rollei()" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5818/">CVE-2018-5818</cve>
	<bugzilla href="https://bugzilla.suse.com/1120516">SUSE bug 1120516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521184" comment="libraw9-0.15.4-30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5819" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5819" ref_url="https://www.suse.com/security/cve/CVE-2018-5819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An error within the "parse_sinar_ia()" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5819/">CVE-2018-5819</cve>
	<bugzilla href="https://bugzilla.suse.com/1120517">SUSE bug 1120517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521184" comment="libraw9-0.15.4-30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115339">SUSE bug 1115339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519726" comment="kernel-default-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519727" comment="kernel-default-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519728" comment="kernel-default-extra-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519729" comment="kernel-devel-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519730" comment="kernel-macros-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519731" comment="kernel-source-4.4.138-94.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519732" comment="kernel-syms-4.4.138-94.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5873" ref_url="https://www.suse.com/security/cve/CVE-2018-5873" source="SUSE CVE"/>
    <description>
    An issue was discovered in the __ns_get_path function in fs/nsfs.c in the Linux kernel before 4.11. Due to a race condition when accessing files, a Use After Free condition can occur. This also affects all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-07-05.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5873/">CVE-2018-5873</cve>
	<bugzilla href="https://bugzilla.suse.com/1100490">SUSE bug 1100490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5953" ref_url="https://www.suse.com/security/cve/CVE-2018-5953" source="SUSE CVE"/>
    <description>
    The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "software IO TLB" printk call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5953/">CVE-2018-5953</cve>
	<bugzilla href="https://bugzilla.suse.com/1104131">SUSE bug 1104131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5996" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5996" ref_url="https://www.suse.com/security/cve/CVE-2018-5996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00040.html" source="SUSE-SU"/>
    <description>
    Insufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, allows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5996/">CVE-2018-5996</cve>
	<bugzilla href="https://bugzilla.suse.com/1077724">SUSE bug 1077724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518950" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0324-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00122.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003</cve>
	<bugzilla href="https://bugzilla.suse.com/1076832">SUSE bug 1076832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009170495" comment="libtasn1-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170496" comment="libtasn1-6-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009170497" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520137" comment="libtasn1-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520138" comment="libtasn1-6-4.9-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520139" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2054-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00032.html" source="SUSE-SU"/>
    <description>
    A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<bugzilla href="https://bugzilla.suse.com/1095163">SUSE bug 1095163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519747" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519748" comment="MozillaFirefox-translations-52.8.1esr-109.34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6196" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html" source="SUSE-SU"/>
    <description>
    w3m through 0.5.3 is prone to an infinite recursion flaw in HTMLlineproc0 because the feed_table_block_tag function in table.c does not prevent a negative indent value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196</cve>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189667">SUSE bug 1189667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521701" comment="w3m-0.5.3.git20161120-161.3.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6197" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html" source="SUSE-SU"/>
    <description>
    w3m through 0.5.3 is prone to a NULL pointer dereference flaw in formUpdateBuffer in form.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197</cve>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189667">SUSE bug 1189667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521701" comment="w3m-0.5.3.git20161120-161.3.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6198" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html" source="SUSE-SU"/>
    <description>
    w3m through 0.5.3 does not properly handle temporary files when the ~/.w3m directory is unwritable, which allows a local attacker to craft a symlink attack to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198</cve>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521701" comment="w3m-0.5.3.git20161120-161.3.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6381" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6381" ref_url="https://www.suse.com/security/cve/CVE-2018-6381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00110.html" source="SUSE-SU"/>
    <description>
    In ZZIPlib 0.13.67, 0.13.66, 0.13.65, 0.13.64, 0.13.63, 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57 and 0.13.56 there is a segmentation fault caused by invalid memory access in the zzip_disk_fread function (zzip/mmapped.c) because the size variable is not validated against the amount of file-&gt;stored data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6381/">CVE-2018-6381</cve>
	<bugzilla href="https://bugzilla.suse.com/1078497">SUSE bug 1078497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079094">SUSE bug 1079094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518972" comment="libzzip-0-13-0.13.67-10.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In the ReadDCMImage function in coders/dcm.c in ImageMagick before 7.0.7-23, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allows remote attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095726">SUSE bug 1095726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6467" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6467" ref_url="https://www.suse.com/security/cve/CVE-2018-6467" source="SUSE CVE"/>
    <description>
    The flickrRSS plugin 5.3.1 for WordPress has CSRF via wp-admin/options-general.php.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6467/">CVE-2018-6467</cve>
	<bugzilla href="https://bugzilla.suse.com/1133186">SUSE bug 1133186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6484" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6484" ref_url="https://www.suse.com/security/cve/CVE-2018-6484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00110.html" source="SUSE-SU"/>
    <description>
    In ZZIPlib 0.13.67, there is a memory alignment error and bus error in the __zzip_fetch_disk_trailer function of zzip/zip.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6484/">CVE-2018-6484</cve>
	<bugzilla href="https://bugzilla.suse.com/1078701">SUSE bug 1078701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079094">SUSE bug 1079094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079095">SUSE bug 1079095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080546">SUSE bug 1080546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518972" comment="libzzip-0-13-0.13.67-10.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518942" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518943" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518944" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518945" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518947" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518948" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518949" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6540" ref_url="https://www.suse.com/security/cve/CVE-2018-6540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00110.html" source="SUSE-SU"/>
    <description>
    In ZZIPlib 0.13.67, there is a bus error caused by loading of a misaligned address in the zzip_disk_findfirst function of zzip/mmapped.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6540/">CVE-2018-6540</cve>
	<bugzilla href="https://bugzilla.suse.com/1079094">SUSE bug 1079094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079096">SUSE bug 1079096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518972" comment="libzzip-0-13-0.13.67-10.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6542" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6542" ref_url="https://www.suse.com/security/cve/CVE-2018-6542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00007.html" source="SUSE-SU"/>
    <description>
    In ZZIPlib 0.13.67, there is a bus error (when handling a disk64_trailer seek value) caused by loading of a misaligned address in the zzip_disk_findfirst function of zzip/mmapped.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6542/">CVE-2018-6542</cve>
	<bugzilla href="https://bugzilla.suse.com/1079094">SUSE bug 1079094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519645" comment="libzzip-0-13-0.13.67-10.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518942" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518943" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518944" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518945" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518947" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518948" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518949" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6553" ref_url="https://www.suse.com/security/cve/CVE-2018-6553" source="SUSE CVE"/>
    <description>
    The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6553/">CVE-2018-6553</cve>
	<bugzilla href="https://bugzilla.suse.com/1102219">SUSE bug 1102219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334301" comment="cups is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6554" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6555" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6559" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6559" ref_url="https://www.suse.com/security/cve/CVE-2018-6559" source="SUSE CVE"/>
    <description>
    The Linux kernel, as used in Ubuntu 18.04 LTS and Ubuntu 18.10, allows local users to obtain names of files in which they would not normally be able to access via an overlayfs mount inside of a user namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6559/">CVE-2018-6559</cve>
	<bugzilla href="https://bugzilla.suse.com/1112680">SUSE bug 1112680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6764" ref_url="https://www.suse.com/security/cve/CVE-2018-6764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00011.html" source="SUSE-SU"/>
    <description>
    util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6764/">CVE-2018-6764</cve>
	<bugzilla href="https://bugzilla.suse.com/1080042">SUSE bug 1080042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519128" comment="libvirt-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519129" comment="libvirt-client-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519130" comment="libvirt-client-32bit-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519131" comment="libvirt-daemon-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519132" comment="libvirt-daemon-config-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519133" comment="libvirt-daemon-config-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519134" comment="libvirt-daemon-driver-interface-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519135" comment="libvirt-daemon-driver-libxl-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519136" comment="libvirt-daemon-driver-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519137" comment="libvirt-daemon-driver-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519138" comment="libvirt-daemon-driver-nodedev-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519139" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519140" comment="libvirt-daemon-driver-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519141" comment="libvirt-daemon-driver-secret-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519142" comment="libvirt-daemon-driver-storage-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519143" comment="libvirt-daemon-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519144" comment="libvirt-daemon-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519145" comment="libvirt-daemon-xen-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519146" comment="libvirt-doc-2.0.0-27.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520603" comment="libvirt-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520604" comment="libvirt-admin-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520605" comment="libvirt-client-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520606" comment="libvirt-daemon-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520607" comment="libvirt-daemon-config-network-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520608" comment="libvirt-daemon-config-nwfilter-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520609" comment="libvirt-daemon-driver-interface-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520610" comment="libvirt-daemon-driver-libxl-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520611" comment="libvirt-daemon-driver-lxc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520612" comment="libvirt-daemon-driver-network-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520613" comment="libvirt-daemon-driver-nodedev-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520614" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520615" comment="libvirt-daemon-driver-qemu-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520616" comment="libvirt-daemon-driver-secret-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520617" comment="libvirt-daemon-driver-storage-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520618" comment="libvirt-daemon-driver-storage-core-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520619" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520620" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520621" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520622" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520623" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520624" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520625" comment="libvirt-daemon-lxc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520626" comment="libvirt-daemon-qemu-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520627" comment="libvirt-daemon-xen-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520628" comment="libvirt-doc-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520629" comment="libvirt-libs-3.3.0-5.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520630" comment="virt-install-1.4.1-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520631" comment="virt-manager-1.4.1-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520632" comment="virt-manager-common-1.4.1-5.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6797" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00075.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00075.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6829" ref_url="https://www.suse.com/security/cve/CVE-2018-6829" source="SUSE CVE"/>
    <description>
    cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6829/">CVE-2018-6829</cve>
	<bugzilla href="https://bugzilla.suse.com/1081684">SUSE bug 1081684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334024" comment="libgcrypt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6836" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6836" ref_url="https://www.suse.com/security/cve/CVE-2018-6836" source="SUSE CVE"/>
    <description>
    The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6836/">CVE-2018-6836</cve>
	<bugzilla href="https://bugzilla.suse.com/1080229">SUSE bug 1080229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6871" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0443-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 5.4.5 and 6.x before 6.0.1 allows remote attackers to read arbitrary files via =WEBSERVICE calls in a document, which use the COM.MICROSOFT.WEBSERVICE function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871</cve>
	<bugzilla href="https://bugzilla.suse.com/1080249">SUSE bug 1080249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518893" comment="libreoffice-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518894" comment="libreoffice-base-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518895" comment="libreoffice-base-drivers-mysql-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518896" comment="libreoffice-base-drivers-postgresql-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518897" comment="libreoffice-calc-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518898" comment="libreoffice-calc-extensions-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518899" comment="libreoffice-draw-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518900" comment="libreoffice-filters-optional-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518901" comment="libreoffice-gnome-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518902" comment="libreoffice-icon-theme-galaxy-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518903" comment="libreoffice-icon-theme-tango-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518904" comment="libreoffice-impress-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518905" comment="libreoffice-l10n-af-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518906" comment="libreoffice-l10n-ar-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518907" comment="libreoffice-l10n-ca-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518908" comment="libreoffice-l10n-cs-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518909" comment="libreoffice-l10n-da-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518910" comment="libreoffice-l10n-de-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518911" comment="libreoffice-l10n-en-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518912" comment="libreoffice-l10n-es-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518913" comment="libreoffice-l10n-fi-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518914" comment="libreoffice-l10n-fr-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518915" comment="libreoffice-l10n-gu-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518916" comment="libreoffice-l10n-hi-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518917" comment="libreoffice-l10n-hu-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518918" comment="libreoffice-l10n-it-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518919" comment="libreoffice-l10n-ja-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518920" comment="libreoffice-l10n-ko-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518921" comment="libreoffice-l10n-nb-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518922" comment="libreoffice-l10n-nl-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518923" comment="libreoffice-l10n-nn-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518924" comment="libreoffice-l10n-pl-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518925" comment="libreoffice-l10n-pt_BR-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518926" comment="libreoffice-l10n-pt_PT-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518927" comment="libreoffice-l10n-ro-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518928" comment="libreoffice-l10n-ru-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518929" comment="libreoffice-l10n-sk-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518930" comment="libreoffice-l10n-sv-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518931" comment="libreoffice-l10n-xh-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518932" comment="libreoffice-l10n-zh_CN-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518933" comment="libreoffice-l10n-zh_TW-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518934" comment="libreoffice-l10n-zu-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518935" comment="libreoffice-mailmerge-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518936" comment="libreoffice-math-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518937" comment="libreoffice-officebean-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518938" comment="libreoffice-pyuno-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518939" comment="libreoffice-writer-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518940" comment="libreoffice-writer-extensions-5.4.5.1-40.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518941" comment="libreofficekit-5.4.5.1-40.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520680" comment="boost-license1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520681" comment="gnome-documents-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520682" comment="gnome-documents-lang-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520683" comment="gnome-documents_books-common-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520684" comment="gnome-shell-search-provider-documents-3.20.1-10.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520685" comment="libboost_atomic1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520686" comment="libboost_date_time1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520687" comment="libboost_filesystem1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520688" comment="libboost_iostreams1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520689" comment="libboost_locale1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520690" comment="libboost_program_options1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520691" comment="libboost_random1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520692" comment="libboost_regex1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520693" comment="libboost_signals1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520694" comment="libboost_system1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520695" comment="libboost_thread1_54_0-1.54.0-26.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520696" comment="libepubgen-0_1-1-0.1.0-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520697" comment="libixion-0_13-0-0.13.0-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520698" comment="libmwaw-0_3-3-0.3.13-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520699" comment="liborcus-0_13-0-0.13.4-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520700" comment="libqxp-0_0-0-0.0.1-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520701" comment="libreoffice-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520702" comment="libreoffice-base-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520703" comment="libreoffice-base-drivers-mysql-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520704" comment="libreoffice-base-drivers-postgresql-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520705" comment="libreoffice-branding-upstream-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520706" comment="libreoffice-calc-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520707" comment="libreoffice-calc-extensions-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520708" comment="libreoffice-draw-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520709" comment="libreoffice-filters-optional-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520710" comment="libreoffice-gnome-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520711" comment="libreoffice-gtk2-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520479" comment="libreoffice-icon-theme-galaxy-5.4.5.1-43.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520480" comment="libreoffice-icon-theme-tango-5.4.5.1-43.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520712" comment="libreoffice-icon-themes-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520713" comment="libreoffice-impress-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520714" comment="libreoffice-l10n-af-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520715" comment="libreoffice-l10n-ar-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520716" comment="libreoffice-l10n-ca-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520717" comment="libreoffice-l10n-cs-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520718" comment="libreoffice-l10n-da-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520719" comment="libreoffice-l10n-de-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520720" comment="libreoffice-l10n-en-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520721" comment="libreoffice-l10n-es-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520722" comment="libreoffice-l10n-fi-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520723" comment="libreoffice-l10n-fr-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520724" comment="libreoffice-l10n-gu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520725" comment="libreoffice-l10n-hi-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520726" comment="libreoffice-l10n-hu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520727" comment="libreoffice-l10n-it-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520728" comment="libreoffice-l10n-ja-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520729" comment="libreoffice-l10n-ko-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520730" comment="libreoffice-l10n-nb-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520731" comment="libreoffice-l10n-nl-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520732" comment="libreoffice-l10n-nn-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520733" comment="libreoffice-l10n-pl-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520734" comment="libreoffice-l10n-pt_BR-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520735" comment="libreoffice-l10n-pt_PT-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520736" comment="libreoffice-l10n-ro-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520737" comment="libreoffice-l10n-ru-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520738" comment="libreoffice-l10n-sk-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520739" comment="libreoffice-l10n-sv-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520740" comment="libreoffice-l10n-xh-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520741" comment="libreoffice-l10n-zh_CN-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520742" comment="libreoffice-l10n-zh_TW-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520743" comment="libreoffice-l10n-zu-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520744" comment="libreoffice-mailmerge-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520745" comment="libreoffice-math-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520746" comment="libreoffice-officebean-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520747" comment="libreoffice-pyuno-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520748" comment="libreoffice-writer-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520749" comment="libreoffice-writer-extensions-6.0.3.2-43.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520518" comment="libreofficekit-5.4.5.1-43.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520750" comment="libstaroffice-0_0-0-0.0.5-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520751" comment="libwps-0_4-4-0.4.7-10.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520752" comment="myspell-af_NA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520753" comment="myspell-af_ZA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520754" comment="myspell-ar-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520755" comment="myspell-ar_AE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520756" comment="myspell-ar_BH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520757" comment="myspell-ar_DZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520758" comment="myspell-ar_EG-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520759" comment="myspell-ar_IQ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520760" comment="myspell-ar_JO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520761" comment="myspell-ar_KW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520762" comment="myspell-ar_LB-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520763" comment="myspell-ar_LY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520764" comment="myspell-ar_MA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520765" comment="myspell-ar_OM-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520766" comment="myspell-ar_QA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520767" comment="myspell-ar_SA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520768" comment="myspell-ar_SD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520769" comment="myspell-ar_SY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520770" comment="myspell-ar_TN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520771" comment="myspell-ar_YE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520772" comment="myspell-be_BY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520773" comment="myspell-bg_BG-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520774" comment="myspell-bn_BD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520775" comment="myspell-bn_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520776" comment="myspell-bs-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520777" comment="myspell-bs_BA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520778" comment="myspell-ca-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520779" comment="myspell-ca_AD-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520780" comment="myspell-ca_ES-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520781" comment="myspell-ca_ES_valencia-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520782" comment="myspell-ca_FR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520783" comment="myspell-ca_IT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520784" comment="myspell-cs_CZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520785" comment="myspell-da_DK-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520786" comment="myspell-de-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520787" comment="myspell-de_AT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520788" comment="myspell-de_CH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520789" comment="myspell-de_DE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520790" comment="myspell-dictionaries-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520791" comment="myspell-el_GR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520792" comment="myspell-en-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520793" comment="myspell-en_AU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520794" comment="myspell-en_BS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520795" comment="myspell-en_BZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520796" comment="myspell-en_CA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520797" comment="myspell-en_GB-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520798" comment="myspell-en_GH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520799" comment="myspell-en_IE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520800" comment="myspell-en_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520801" comment="myspell-en_JM-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520802" comment="myspell-en_MW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520803" comment="myspell-en_NA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520804" comment="myspell-en_NZ-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520805" comment="myspell-en_PH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520806" comment="myspell-en_TT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520807" comment="myspell-en_US-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520808" comment="myspell-en_ZA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520809" comment="myspell-en_ZW-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520810" comment="myspell-es-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520811" comment="myspell-es_AR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520812" comment="myspell-es_BO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520813" comment="myspell-es_CL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520814" comment="myspell-es_CO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520815" comment="myspell-es_CR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520816" comment="myspell-es_CU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520817" comment="myspell-es_DO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520818" comment="myspell-es_EC-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520819" comment="myspell-es_ES-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520820" comment="myspell-es_GT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520821" comment="myspell-es_HN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520822" comment="myspell-es_MX-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520823" comment="myspell-es_NI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520824" comment="myspell-es_PA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520825" comment="myspell-es_PE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520826" comment="myspell-es_PR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520827" comment="myspell-es_PY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520828" comment="myspell-es_SV-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520829" comment="myspell-es_UY-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520830" comment="myspell-es_VE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520831" comment="myspell-et_EE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520832" comment="myspell-fr_BE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520833" comment="myspell-fr_CA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520834" comment="myspell-fr_CH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520835" comment="myspell-fr_FR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520836" comment="myspell-fr_LU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520837" comment="myspell-fr_MC-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520838" comment="myspell-gu_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520839" comment="myspell-he_IL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520840" comment="myspell-hi_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520841" comment="myspell-hr_HR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520842" comment="myspell-hu_HU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520843" comment="myspell-id-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520844" comment="myspell-id_ID-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520845" comment="myspell-it_IT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520846" comment="myspell-lightproof-en-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520847" comment="myspell-lightproof-hu_HU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520848" comment="myspell-lightproof-pt_BR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520849" comment="myspell-lightproof-ru_RU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520850" comment="myspell-lo_LA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520851" comment="myspell-lt_LT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520852" comment="myspell-lv_LV-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520853" comment="myspell-nb_NO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520854" comment="myspell-nl_BE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520855" comment="myspell-nl_NL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520856" comment="myspell-nn_NO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520857" comment="myspell-no-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520858" comment="myspell-pl_PL-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520859" comment="myspell-pt_AO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520860" comment="myspell-pt_BR-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520861" comment="myspell-pt_PT-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520862" comment="myspell-ro-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520863" comment="myspell-ro_RO-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520864" comment="myspell-ru_RU-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520865" comment="myspell-sk_SK-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520866" comment="myspell-sl_SI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520867" comment="myspell-sr-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520868" comment="myspell-sr_CS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520869" comment="myspell-sr_Latn_CS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520870" comment="myspell-sr_Latn_RS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520871" comment="myspell-sr_RS-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520872" comment="myspell-sv_FI-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520873" comment="myspell-sv_SE-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520874" comment="myspell-te-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520875" comment="myspell-te_IN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520876" comment="myspell-th_TH-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520877" comment="myspell-uk_UA-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520878" comment="myspell-vi-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520879" comment="myspell-vi_VN-20180403-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520880" comment="myspell-zu_ZA-20180403-16.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6876" ref_url="https://www.suse.com/security/cve/CVE-2018-6876" source="SUSE CVE"/>
    <description>
    The OLEProperty class in ole/oleprop.cpp in libfpx 1.3.1-10, as used in ImageMagick 7.0.7-22 Q16 and other products, allows remote attackers to cause a denial of service (stack-based buffer under-read) via a crafted bmp image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-6876/">CVE-2018-6876</cve>
	<bugzilla href="https://bugzilla.suse.com/1081305">SUSE bug 1081305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00075.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006839.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6951" ref_url="https://www.suse.com/security/cve/CVE-2018-6951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6951/">CVE-2018-6951</cve>
	<bugzilla href="https://bugzilla.suse.com/1080951">SUSE bug 1080951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175223" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520881" comment="patch-2.7.5-8.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" source="SUSE-SU"/>
    <description>
    systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003805.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169</cve>
	<bugzilla href="https://bugzilla.suse.com/1081294">SUSE bug 1081294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512619" comment="shadow-4.2.1-27.19.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519006" comment="shadow-4.2.1-27.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3342-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00069.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155513">SUSE bug 1155513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520262" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520263" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7225" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00073.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334129" comment="tigervnc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7253" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<bugzilla href="https://bugzilla.suse.com/1081692">SUSE bug 1081692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7254" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<bugzilla href="https://bugzilla.suse.com/1081693">SUSE bug 1081693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7262" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7262" ref_url="https://www.suse.com/security/cve/CVE-2018-7262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004401.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00114.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00071.html" source="SUSE-SU"/>
    <description>
    In Ceph before 12.2.3 and 13.x through 13.0.1, the rgw_civetweb.cc RGWCivetWeb::init_env function in radosgw doesn't handle malformed HTTP headers properly, allowing for denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-7262/">CVE-2018-7262</cve>
	<bugzilla href="https://bugzilla.suse.com/1081379">SUSE bug 1081379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512053" comment="ceph-common-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512054" comment="libcephfs2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512055" comment="librados2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512056" comment="libradosstriper1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512057" comment="librbd1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512058" comment="librgw2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512059" comment="python-cephfs-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512060" comment="python-rados-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512061" comment="python-rbd-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512062" comment="python-rgw-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521008" comment="ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521009" comment="libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521010" comment="librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521011" comment="libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521012" comment="librbd1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521013" comment="librgw2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521014" comment="python-cephfs-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521015" comment="python-rados-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521016" comment="python-rbd-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521017" comment="python-rgw-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the IEEE 802.11 dissector could crash. This was addressed in epan/crypt/airpdcap.c by rejecting lengths that are too small.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the FCP protocol dissector could crash. This was addressed in epan/dissectors/packet-fcp.c by checking for a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7337" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7409" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00050.html" source="SUSE-SU"/>
    <description>
    In unixODBC before 2.3.5, there is a buffer overflow in the unicode_to_ansi_copy() function in DriverManager/__info.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409</cve>
	<bugzilla href="https://bugzilla.suse.com/1082290">SUSE bug 1082290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512626" comment="unixODBC-2.3.6-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512627" comment="unixODBC-32bit-2.3.6-7.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519751" comment="unixODBC-2.3.6-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519752" comment="unixODBC-32bit-2.3.6-7.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the IPMI dissector could crash. This was addressed in epan/dissectors/packet-ipmi-picmg.c by adding support for crafted packets that lack an IPMI header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the NBAP dissector could crash. This was addressed in epan/dissectors/asn1/nbap/nbap.cnf by ensuring DCH ID initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7421" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7443" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-23 Q16 does not properly validate the amount of image data in a file, which allows remote attackers to cause a denial of service (memory allocation failure in the AcquireMagickMemory function in MagickCore/memory.c).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<bugzilla href="https://bugzilla.suse.com/1075944">SUSE bug 1075944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7456" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
    <description>
    A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519749" comment="libtiff5-4.0.9-44.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519750" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7470" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7470" ref_url="https://www.suse.com/security/cve/CVE-2018-7470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7-22 Q16. The IsWEBPImageLossless function in coders/webp.c allows attackers to cause a denial of service (segmentation violation) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7470/">CVE-2018-7470</cve>
	<bugzilla href="https://bugzilla.suse.com/1082837">SUSE bug 1082837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480</cve>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520130" comment="kernel-default-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520131" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520132" comment="kernel-default-extra-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520136" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7485" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00050.html" source="SUSE-SU"/>
    <description>
    The SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c in unixODBC 2.3.5 has strncpy arguments in the wrong order, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485</cve>
	<bugzilla href="https://bugzilla.suse.com/1082484">SUSE bug 1082484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512626" comment="unixODBC-2.3.6-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512627" comment="unixODBC-32bit-2.3.6-7.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519751" comment="unixODBC-2.3.6-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519752" comment="unixODBC-32bit-2.3.6-7.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520889" comment="xen-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520890" comment="xen-libs-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520891" comment="xen-libs-32bit-4.9.2_04-3.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520889" comment="xen-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520890" comment="xen-libs-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520891" comment="xen-libs-32bit-4.9.2_04-3.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542</cve>
	<bugzilla href="https://bugzilla.suse.com/1080634">SUSE bug 1080634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520889" comment="xen-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520890" comment="xen-libs-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520891" comment="xen-libs-32bit-4.9.2_04-3.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7548" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7548" ref_url="https://www.suse.com/security/cve/CVE-2018-7548" source="SUSE CVE"/>
    <description>
    In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7548/">CVE-2018-7548</cve>
	<bugzilla href="https://bugzilla.suse.com/1082981">SUSE bug 1082981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339511" comment="zsh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7549" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549</cve>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html" source="SUSE-SU"/>
    <description>
    The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7570" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128518">SUSE bug 1128518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7648" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7648" ref_url="https://www.suse.com/security/cve/CVE-2018-7648" source="SUSE CVE"/>
    <description>
    An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7648/">CVE-2018-7648</cve>
	<bugzilla href="https://bugzilla.suse.com/1083901">SUSE bug 1083901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004582.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2881-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00079.html" source="SUSE-SU"/>
    <description>
    The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512570" comment="libzypp-16.19.0-2.36.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520073" comment="libzypp-16.17.20-2.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520074" comment="zypper-1.13.45-21.21.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520075" comment="zypper-log-1.13.45-21.21.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7725" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7725" ref_url="https://www.suse.com/security/cve/CVE-2018-7725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003884.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0940-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7725/">CVE-2018-7725</cve>
	<bugzilla href="https://bugzilla.suse.com/1084519">SUSE bug 1084519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520633" comment="libzzip-0-13-0.13.67-10.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7726" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7726" ref_url="https://www.suse.com/security/cve/CVE-2018-7726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003884.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0940-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib 0.13.68. There is a bus error caused by the __zzip_parse_root_directory function of zip.c. Attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7726/">CVE-2018-7726</cve>
	<bugzilla href="https://bugzilla.suse.com/1084517">SUSE bug 1084517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520633" comment="libzzip-0-13-0.13.67-10.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7727" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7727" ref_url="https://www.suse.com/security/cve/CVE-2018-7727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006273.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib 0.13.68. There is a memory leak triggered in the function zzip_mem_disk_new in memdisk.c, which will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7727/">CVE-2018-7727</cve>
	<bugzilla href="https://bugzilla.suse.com/1084515">SUSE bug 1084515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522432" comment="libzzip-0-13-0.13.67-10.25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7728" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00064.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. XMPFiles/source/FileHandlers/TIFF_Handler.cpp mishandles a case of a zero length, leading to a heap-based buffer over-read in the MD5Update() function in third-party/zuid/interfaces/MD5.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728</cve>
	<bugzilla href="https://bugzilla.suse.com/1085297">SUSE bug 1085297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512308" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520272" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7729" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7729" ref_url="https://www.suse.com/security/cve/CVE-2018-7729" source="SUSE CVE"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. There is a stack-based buffer over-read in the PostScript_MetaHandler::ParsePSFile() function in XMPFiles/source/FileHandlers/PostScript_Handler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7729/">CVE-2018-7729</cve>
	<bugzilla href="https://bugzilla.suse.com/1085296">SUSE bug 1085296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334096" comment="exempi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7730" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00064.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. A certain case of a 0xffffffff length is mishandled in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp, leading to a heap-based buffer over-read in the PSD_MetaHandler::CacheFileData() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103718">SUSE bug 1103718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512308" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520272" comment="libexempi3-2.2.1-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7731" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7731" ref_url="https://www.suse.com/security/cve/CVE-2018-7731" source="SUSE CVE"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. XMPFiles/source/FormatSupport/WEBP_Support.cpp does not check whether a bitstream has a NULL value, leading to a NULL pointer dereference in the WEBP::VP8XChunk class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7731/">CVE-2018-7731</cve>
	<bugzilla href="https://bugzilla.suse.com/1085294">SUSE bug 1085294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334096" comment="exempi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00007.html" source="SUSE-SU"/>
    <description>
    In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512244" comment="libblkid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512245" comment="libblkid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512246" comment="libfdisk1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512247" comment="libmount1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512248" comment="libmount1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512249" comment="libsmartcols1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512250" comment="libuuid-devel-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512251" comment="libuuid1-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512252" comment="libuuid1-32bit-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512253" comment="python-libmount-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512254" comment="util-linux-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512255" comment="util-linux-lang-2.29.2-7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512256" comment="util-linux-systemd-2.29.2-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512257" comment="uuidd-2.29.2-7.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519962" comment="libblkid1-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519963" comment="libblkid1-32bit-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519964" comment="libfdisk1-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519965" comment="libmount1-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519966" comment="libmount1-32bit-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519967" comment="libsmartcols1-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519968" comment="libuuid-devel-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519969" comment="libuuid1-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519970" comment="libuuid1-32bit-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519971" comment="python-libmount-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519972" comment="util-linux-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519973" comment="util-linux-lang-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519974" comment="util-linux-systemd-2.29.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519975" comment="uuidd-2.29.2-3.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0972-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520660" comment="kernel-default-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520661" comment="kernel-default-devel-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520662" comment="kernel-default-extra-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520663" comment="kernel-devel-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520664" comment="kernel-macros-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520665" comment="kernel-source-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520666" comment="kernel-syms-4.4.126-94.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520130" comment="kernel-default-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520131" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520132" comment="kernel-default-extra-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520136" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7999" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003860.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0883-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00002.html" source="SUSE-SU"/>
    <description>
    In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference vulnerability was found in Segment.cpp during a dumbRendering operation, which may allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ttf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999</cve>
	<bugzilla href="https://bugzilla.suse.com/1084850">SUSE bug 1084850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009174098" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009174099" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519126" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519127" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8001" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8001" ref_url="https://www.suse.com/security/cve/CVE-2018-8001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00027.html" source="SUSE-SU"/>
    <description>
    In PoDoFo 0.9.5, there exists a heap-based buffer over-read vulnerability in UnescapeName() in PdfName.cpp. Remote attackers could leverage this vulnerability to cause a denial-of-service or possibly unspecified other impact via a crafted pdf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8001/">CVE-2018-8001</cve>
	<bugzilla href="https://bugzilla.suse.com/1084894">SUSE bug 1084894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0972-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<bugzilla href="https://bugzilla.suse.com/1084829">SUSE bug 1084829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520660" comment="kernel-default-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520661" comment="kernel-default-devel-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520662" comment="kernel-default-extra-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520663" comment="kernel-devel-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520664" comment="kernel-macros-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520665" comment="kernel-source-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520666" comment="kernel-syms-4.4.126-94.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8086" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8086" ref_url="https://www.suse.com/security/cve/CVE-2018-8086" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-8086/">CVE-2018-8086</cve>
	<bugzilla href="https://bugzilla.suse.com/1085008">SUSE bug 1085008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<bugzilla href="https://bugzilla.suse.com/1085053">SUSE bug 1085053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html" source="SUSE-SU"/>
    <description>
    In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521147" comment="libsqlite3-0-3.8.10.2-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521148" comment="libsqlite3-0-32bit-3.8.10.2-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521149" comment="sqlite3-3.8.10.2-9.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8769" ref_url="https://www.suse.com/security/cve/CVE-2018-8769" source="SUSE CVE"/>
    <description>
    elfutils 0.170 has a buffer over-read in the ebl_dynamic_tag_name function of libebl/ebldynamictagname.c because SYMTAB_SHNDX is unsupported.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8769/">CVE-2018-8769</cve>
	<bugzilla href="https://bugzilla.suse.com/1085809">SUSE bug 1085809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8784" ref_url="https://www.suse.com/security/cve/CVE-2018-8784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00022.html" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8784/">CVE-2018-8784</cve>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8785" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8785" ref_url="https://www.suse.com/security/cve/CVE-2018-8785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00022.html" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8785/">CVE-2018-8785</cve>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117967">SUSE bug 1117967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8786" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00022.html" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786</cve>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117966">SUSE bug 1117966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8787" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00022.html" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787</cve>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117964">SUSE bug 1117964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8788" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00022.html" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788</cve>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8789" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8789" ref_url="https://www.suse.com/security/cve/CVE-2018-8789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00022.html" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8789/">CVE-2018-8789</cve>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117965">SUSE bug 1117965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    WriteEPTImage in coders/ept.c in ImageMagick 7.0.7-25 Q16 allows remote attackers to cause a denial of service (MagickCore/memory.c double free and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
    <description>
    Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520660" comment="kernel-default-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520661" comment="kernel-default-devel-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520662" comment="kernel-default-extra-4.4.126-94.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520663" comment="kernel-devel-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520664" comment="kernel-macros-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520665" comment="kernel-source-4.4.126-94.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520666" comment="kernel-syms-4.4.126-94.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="TID000019188" ref_url="https://www.suse.com/support/kb/doc/?id=000019188" source="SUSE-SU"/>
		<reference ref_id="TID7022916" ref_url="https://www.suse.com/support/kb/doc/?id=7022916" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093522">SUSE bug 1093522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100835">SUSE bug 1100835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520889" comment="xen-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520890" comment="xen-libs-4.9.2_04-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520891" comment="xen-libs-32bit-4.9.2_04-3.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8905" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519749" comment="libtiff5-4.0.9-44.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519750" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8960" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960</cve>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8975" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005619.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00056.html" source="SUSE-SU"/>
    <description>
    The pm_mallocarray2 function in lib/util/mallocvar.c in Netpbm through 10.81.03 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, as demonstrated by pbmmask.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975</cve>
	<bugzilla href="https://bugzilla.suse.com/1086777">SUSE bug 1086777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521534" comment="libnetpbm11-10.66.3-8.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521535" comment="libnetpbm11-32bit-10.66.3-8.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521536" comment="netpbm-10.66.3-8.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8976" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8976" ref_url="https://www.suse.com/security/cve/CVE-2018-8976" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, jpgimage.cpp allows remote attackers to cause a denial of service (image.cpp Exiv2::Internal::stringFormat out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8976/">CVE-2018-8976</cve>
	<bugzilla href="https://bugzilla.suse.com/1086810">SUSE bug 1086810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.3.28, there is a divide-by-zero in the ReadMNGImage function of coders/png.c. Remote attackers could leverage this vulnerability to cause a crash and denial of service via a crafted mng file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018</cve>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9055" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00108.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.14 allows denial of service via a reachable assertion in the function jpc_firstone in libjasper/jpc/jpc_math.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<bugzilla href="https://bugzilla.suse.com/1087020">SUSE bug 1087020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521018" comment="libjasper1-1.900.14-195.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521019" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9133" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9133" ref_url="https://www.suse.com/security/cve/CVE-2018-9133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-26 Q16 has excessive iteration in the DecodeLabImage and EncodeLabImage functions (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9133/">CVE-2018-9133</cve>
	<bugzilla href="https://bugzilla.suse.com/1087820">SUSE bug 1087820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9135" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-24 Q16, there is a heap-based buffer over-read in IsWEBPImageLossless in coders/webp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135</cve>
	<bugzilla href="https://bugzilla.suse.com/1087825">SUSE bug 1087825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9144" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9144" ref_url="https://www.suse.com/security/cve/CVE-2018-9144" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is an out-of-bounds read in Exiv2::Internal::binaryToString in image.cpp. It could result in denial of service or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9144/">CVE-2018-9144</cve>
	<bugzilla href="https://bugzilla.suse.com/1087877">SUSE bug 1087877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9145" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9145" ref_url="https://www.suse.com/security/cve/CVE-2018-9145" source="SUSE CVE"/>
    <description>
    In the DataBuf class in include/exiv2/types.hpp in Exiv2 0.26, an issue exists in the constructor with an initial buffer size. A large size value may lead to a SIGABRT during an attempt at memory allocation. NOTE: some third parties have been unable to reproduce the SIGABRT when using the 4-DataBuf-abort-1 PoC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9145/">CVE-2018-9145</cve>
	<bugzilla href="https://bugzilla.suse.com/1087879">SUSE bug 1087879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234" source="SUSE CVE"/>
    <description>
    GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234</cve>
	<bugzilla href="https://bugzilla.suse.com/1088255">SUSE bug 1088255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333951" comment="gpg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9251" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00029.html" source="SUSE-SU"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520155" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520156" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520157" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520158" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9256" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the LWAPP dissector could crash. This was addressed in epan/dissectors/packet-lwapp.c by limiting the encapsulation levels to restrict the recursion depth.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9259" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the MP4 dissector could crash. This was addressed in epan/dissectors/file-mp4.c by restricting the box recursion depth.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9260" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the IEEE 802.15.4 dissector could crash. This was addressed in epan/dissectors/packet-ieee802154.c by ensuring that an allocation step occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the NBAP dissector could crash with a large loop that ends with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-nbap.c by prohibiting the self-linking of DCH-IDs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9262" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the VLAN dissector could crash. This was addressed in epan/dissectors/packet-vlan.c by limiting VLAN tag nesting to restrict the recursion depth.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9263" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the Kerberos dissector could crash. This was addressed in epan/dissectors/packet-kerberos.c by ensuring a nonzero key length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9264" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the ADB dissector could crash with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-adb.c by checking for a length inconsistency.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9265" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-tn3270.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9266" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-isup.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9267" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-lapd.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9268" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-smb2.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9269" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-giop.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9270" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/oids.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9271" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-multipart.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9272" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-h223.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9273" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-pcp.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9274" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00015.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, ui/failure_message.c has a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9275" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9275" ref_url="https://www.suse.com/security/cve/CVE-2018-9275" source="SUSE CVE"/>
    <description>
    In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9275/">CVE-2018-9275</cve>
	<bugzilla href="https://bugzilla.suse.com/1088027">SUSE bug 1088027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512588" comment="pam_yubico-2.26-1.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9305" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26, an out-of-bounds read in IptcData::printStructure in iptc.c could result in a crash or information leak, related to the "== 0x1c" case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305</cve>
	<bugzilla href="https://bugzilla.suse.com/1088424">SUSE bug 1088424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9306" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9306" ref_url="https://www.suse.com/security/cve/CVE-2018-9306" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-17724.  Reason: This candidate is a reservation duplicate of CVE-2017-17724.  Notes: All CVE users should reference CVE-2017-17724 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-9306/">CVE-2018-9306</cve>
	<bugzilla href="https://bugzilla.suse.com/1088425">SUSE bug 1088425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9336" ref_url="https://www.suse.com/security/cve/CVE-2018-9336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00011.html" source="SUSE-SU"/>
    <description>
    openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9336/">CVE-2018-9336</cve>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090839">SUSE bug 1090839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334133" comment="openvpn is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105293">SUSE bug 1105293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9385" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<bugzilla href="https://bugzilla.suse.com/1100491">SUSE bug 1100491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519809" comment="kernel-default-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519810" comment="kernel-default-devel-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519811" comment="kernel-default-extra-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519812" comment="kernel-devel-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519813" comment="kernel-macros-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519814" comment="kernel-source-4.4.140-94.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519815" comment="kernel-syms-4.4.140-94.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9415" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9415" ref_url="https://www.suse.com/security/cve/CVE-2018-9415" source="SUSE CVE"/>
    <description>
    In driver_override_store and driver_override_show of bus.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69129004 References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-9415/">CVE-2018-9415</cve>
	<bugzilla href="https://bugzilla.suse.com/1108501">SUSE bug 1108501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9465" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9465" ref_url="https://www.suse.com/security/cve/CVE-2018-9465" source="SUSE CVE"/>
    <description>
    In task_get_unused_fd_flags of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69164715 References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9465/">CVE-2018-9465</cve>
	<bugzilla href="https://bugzilla.suse.com/1104758">SUSE bug 1104758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
    <description>
    In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520343" comment="kernel-default-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520344" comment="kernel-default-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520345" comment="kernel-default-extra-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520346" comment="kernel-devel-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520347" comment="kernel-macros-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520348" comment="kernel-source-4.4.162-94.69.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520349" comment="kernel-syms-4.4.162-94.69.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9518" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9518" ref_url="https://www.suse.com/security/cve/CVE-2018-9518" source="SUSE CVE"/>
    <description>
    In nfc_llcp_build_sdreq_tlv of llcp_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-73083945.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-9518/">CVE-2018-9518</cve>
	<bugzilla href="https://bugzilla.suse.com/1108500">SUSE bug 1108500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9568" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118320">SUSE bug 1118320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0154" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522354" comment="kernel-default-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522355" comment="kernel-default-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522356" comment="kernel-default-extra-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522357" comment="kernel-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522358" comment="kernel-macros-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522359" comment="kernel-source-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522360" comment="kernel-syms-4.12.14-95.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522354" comment="kernel-default-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522355" comment="kernel-default-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522356" comment="kernel-default-extra-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522357" comment="kernel-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522358" comment="kernel-macros-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522359" comment="kernel-source-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522360" comment="kernel-syms-4.12.14-95.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005268.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160</cve>
	<bugzilla href="https://bugzilla.suse.com/1130267">SUSE bug 1130267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522499" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0161" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1204-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191204-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00046.html" source="SUSE-SU"/>
    <description>
    Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161</cve>
	<bugzilla href="https://bugzilla.suse.com/1131361">SUSE bug 1131361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521825" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.16.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191000019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1000019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1000019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000019" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019</cve>
	<bugzilla href="https://bugzilla.suse.com/1124341">SUSE bug 1124341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191000020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1000020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1000020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000020" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020</cve>
	<bugzilla href="https://bugzilla.suse.com/1124342">SUSE bug 1124342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victim must open a crafted PDF file. The issue occurs because of an incorrect integer overflow protection mechanism in tiff_document_render and tiff_document_get_thumbnail.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334136" comment="evince is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522064" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522065" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010024" ref_url="https://www.suse.com/security/cve/CVE-2019-1010024" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1010024/">CVE-2019-1010024</cve>
	<bugzilla href="https://bugzilla.suse.com/1141869">SUSE bug 1141869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html" source="SUSE-SU"/>
    <description>
    GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522349" comment="gdb-8.3.1-2.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010189" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010189" ref_url="https://www.suse.com/security/cve/CVE-2019-1010189" source="SUSE CVE"/>
    <description>
    mgetty prior to version 1.2.1 is affected by: Infinite Loop. The impact is: DoS, the program does never terminates. The component is: g3/g32pbm.c. The attack vector is: Local, the user should open a specially crafted file. The fixed version is: 1.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010189/">CVE-2019-1010189</cve>
	<bugzilla href="https://bugzilla.suse.com/1142766">SUSE bug 1142766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334137" comment="mgetty is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010190" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010190" ref_url="https://www.suse.com/security/cve/CVE-2019-1010190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006689.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00016.html" source="SUSE-SU"/>
    <description>
    mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010190/">CVE-2019-1010190</cve>
	<bugzilla href="https://bugzilla.suse.com/1142770">SUSE bug 1142770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334137" comment="mgetty is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010220" ref_url="https://www.suse.com/security/cve/CVE-2019-1010220" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010220/">CVE-2019-1010220</cve>
	<bugzilla href="https://bugzilla.suse.com/1142439">SUSE bug 1142439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522066" comment="tcpdump-4.9.2-14.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010238" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010238" ref_url="https://www.suse.com/security/cve/CVE-2019-1010238" source="SUSE CVE"/>
    <description>
    Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010238/">CVE-2019-1010238</cve>
	<bugzilla href="https://bugzilla.suse.com/1142332">SUSE bug 1142332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334108" comment="pango is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010315" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010315" ref_url="https://www.suse.com/security/cve/CVE-2019-1010315" source="SUSE CVE"/>
    <description>
    WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010315/">CVE-2019-1010315</cve>
	<bugzilla href="https://bugzilla.suse.com/1141337">SUSE bug 1141337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010317" ref_url="https://www.suse.com/security/cve/CVE-2019-1010317" source="SUSE CVE"/>
    <description>
    WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1010317/">CVE-2019-1010317</cve>
	<bugzilla href="https://bugzilla.suse.com/1141339">SUSE bug 1141339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010318" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010318" ref_url="https://www.suse.com/security/cve/CVE-2019-1010318" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-11498. Reason: This candidate is a reservation duplicate of CVE-2019-11498. Notes: All CVE users should reference CVE-2019-11498 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-1010318/">CVE-2019-1010318</cve>
	<bugzilla href="https://bugzilla.suse.com/1141338">SUSE bug 1141338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010319" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319</cve>
	<bugzilla href="https://bugzilla.suse.com/1141334">SUSE bug 1141334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10124" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10124" ref_url="https://www.suse.com/security/cve/CVE-2019-10124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10124/">CVE-2019-10124</cve>
	<bugzilla href="https://bugzilla.suse.com/1130699">SUSE bug 1130699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10125" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10125" ref_url="https://www.suse.com/security/cve/CVE-2019-10125" source="SUSE CVE"/>
    <description>
    An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10125/">CVE-2019-10125</cve>
	<bugzilla href="https://bugzilla.suse.com/1130695">SUSE bug 1130695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137944">SUSE bug 1137944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10129" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10129" ref_url="https://www.suse.com/security/cve/CVE-2019-10129" source="SUSE CVE"/>
    <description>
    A vulnerability was found in postgresql versions 11.x prior to 11.3. Using a purpose-crafted insert to a partitioned table, an attacker can read arbitrary bytes of server memory. In the default configuration, any user can create a partitioned table suitable for this attack. (Exploit prerequisites are the same as for CVE-2018-1052).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10129/">CVE-2019-10129</cve>
	<bugzilla href="https://bugzilla.suse.com/1134684">SUSE bug 1134684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339049" comment="postgresql10 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009339049" comment="postgresql10 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334198" comment="postgresql96 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2012-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192012-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in PostgreSQL versions 11.x up to excluding 11.3, 10.x up to excluding 10.8, 9.6.x up to, excluding 9.6.13, 9.5.x up to, excluding 9.5.17. PostgreSQL maintains column statistics for tables. Certain statistics, such as histograms and lists of most common values, contain values taken from the column. PostgreSQL does not evaluate row security policies before consulting those statistics during query planning; an attacker can exploit this to read the most common values of certain columns. Affected columns are those for which the attacker has SELECT privilege and for which, in an ordinary query, row-level security prunes the set of rows visible to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521451" comment="libecpg6-10.8-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521452" comment="libpq5-10.8-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521453" comment="libpq5-32bit-10.8-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521454" comment="postgresql10-10.8-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521539" comment="postgresql96-9.6.13-3.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521451" comment="libecpg6-10.8-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521452" comment="libpq5-10.8-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521453" comment="libpq5-32bit-10.8-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521454" comment="postgresql10-10.8-1.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131</cve>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libvirt &gt;= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132</cve>
	<bugzilla href="https://bugzilla.suse.com/1134348">SUSE bug 1134348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10140" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10140" ref_url="https://www.suse.com/security/cve/CVE-2019-10140" source="SUSE CVE"/>
    <description>
    A vulnerability was found in Linux kernel's, versions up to 3.10, implementation of overlayfs. An attacker with local access can create a denial of service situation via NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10140/">CVE-2019-10140</cve>
	<bugzilla href="https://bugzilla.suse.com/1145701">SUSE bug 1145701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10142" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10142" ref_url="https://www.suse.com/security/cve/CVE-2019-10142" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's freescale hypervisor manager implementation, kernel versions 5.0.x up to, excluding 5.0.17. A parameter passed to an ioctl was incorrectly validated and used in size calculations for the page size calculation. An attacker can use this flaw to crash the system, corrupt memory, or create other adverse security affects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10142/">CVE-2019-10142</cve>
	<bugzilla href="https://bugzilla.suse.com/1135955">SUSE bug 1135955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521897" comment="libvirt-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521898" comment="libvirt-admin-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521899" comment="libvirt-client-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521900" comment="libvirt-daemon-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521901" comment="libvirt-daemon-config-network-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521902" comment="libvirt-daemon-config-nwfilter-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521903" comment="libvirt-daemon-driver-interface-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521904" comment="libvirt-daemon-driver-libxl-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521905" comment="libvirt-daemon-driver-lxc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521906" comment="libvirt-daemon-driver-network-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521907" comment="libvirt-daemon-driver-nodedev-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521908" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521909" comment="libvirt-daemon-driver-qemu-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521910" comment="libvirt-daemon-driver-secret-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521911" comment="libvirt-daemon-driver-storage-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521912" comment="libvirt-daemon-driver-storage-core-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521913" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521914" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521915" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521916" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521917" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521918" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521919" comment="libvirt-daemon-lxc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521920" comment="libvirt-daemon-qemu-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521921" comment="libvirt-daemon-xen-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521922" comment="libvirt-doc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521923" comment="libvirt-libs-4.0.0-8.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1783-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2012-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192012-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166</cve>
	<bugzilla href="https://bugzilla.suse.com/1138302">SUSE bug 1138302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521897" comment="libvirt-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521898" comment="libvirt-admin-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521899" comment="libvirt-client-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521900" comment="libvirt-daemon-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521901" comment="libvirt-daemon-config-network-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521902" comment="libvirt-daemon-config-nwfilter-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521903" comment="libvirt-daemon-driver-interface-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521904" comment="libvirt-daemon-driver-libxl-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521905" comment="libvirt-daemon-driver-lxc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521906" comment="libvirt-daemon-driver-network-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521907" comment="libvirt-daemon-driver-nodedev-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521908" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521909" comment="libvirt-daemon-driver-qemu-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521910" comment="libvirt-daemon-driver-secret-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521911" comment="libvirt-daemon-driver-storage-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521912" comment="libvirt-daemon-driver-storage-core-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521913" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521914" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521915" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521916" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521917" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521918" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521919" comment="libvirt-daemon-lxc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521920" comment="libvirt-daemon-qemu-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521921" comment="libvirt-daemon-xen-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521922" comment="libvirt-doc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521923" comment="libvirt-libs-4.0.0-8.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521897" comment="libvirt-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521898" comment="libvirt-admin-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521899" comment="libvirt-client-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521900" comment="libvirt-daemon-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521901" comment="libvirt-daemon-config-network-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521902" comment="libvirt-daemon-config-nwfilter-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521903" comment="libvirt-daemon-driver-interface-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521904" comment="libvirt-daemon-driver-libxl-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521905" comment="libvirt-daemon-driver-lxc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521906" comment="libvirt-daemon-driver-network-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521907" comment="libvirt-daemon-driver-nodedev-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521908" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521909" comment="libvirt-daemon-driver-qemu-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521910" comment="libvirt-daemon-driver-secret-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521911" comment="libvirt-daemon-driver-storage-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521912" comment="libvirt-daemon-driver-storage-core-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521913" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521914" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521915" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521916" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521917" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521918" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521919" comment="libvirt-daemon-lxc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521920" comment="libvirt-daemon-qemu-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521921" comment="libvirt-daemon-xen-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521922" comment="libvirt-doc-4.0.0-8.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521923" comment="libvirt-libs-4.0.0-8.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168</cve>
	<bugzilla href="https://bugzilla.suse.com/1138305">SUSE bug 1138305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138582">SUSE bug 1138582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197</cve>
	<bugzilla href="https://bugzilla.suse.com/1141267">SUSE bug 1141267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<bugzilla href="https://bugzilla.suse.com/1123959">SUSE bug 1123959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in postgresql versions 9.4.x before 9.4.24, 9.5.x before 9.5.19, 9.6.x before 9.6.15, 10.x before 10.10 and 11.x before 11.5 where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522105" comment="libecpg6-10.10-1.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522106" comment="libpq5-10.10-1.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522107" comment="libpq5-32bit-10.10-1.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522108" comment="postgresql10-10.10-1.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10209" ref_url="https://www.suse.com/security/cve/CVE-2019-10209" source="SUSE CVE"/>
    <description>
    Postgresql, versions 11.x before 11.5, is vulnerable to a memory disclosure in cross-type comparison for hashed subplan.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-10209/">CVE-2019-10209</cve>
	<bugzilla href="https://bugzilla.suse.com/1145091">SUSE bug 1145091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339049" comment="postgresql10 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009339049" comment="postgresql10 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334198" comment="postgresql96 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005903.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00062.html" source="SUSE-SU"/>
    <description>
    In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216</cve>
	<bugzilla href="https://bugzilla.suse.com/1144621">SUSE bug 1144621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522120" comment="ghostscript-9.26a-23.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522121" comment="ghostscript-x11-9.26a-23.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2866-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192866-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2868-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192868-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2875-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192875-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522302" comment="libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522303" comment="libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522304" comment="libdcerpc0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522305" comment="libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522306" comment="libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522307" comment="libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522308" comment="libndr-nbt0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522309" comment="libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522310" comment="libndr-standard0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522311" comment="libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522312" comment="libndr0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522313" comment="libndr0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522314" comment="libnetapi0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522315" comment="libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522316" comment="libsamba-credentials0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522317" comment="libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522318" comment="libsamba-errors0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522319" comment="libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522320" comment="libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522321" comment="libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522322" comment="libsamba-passdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522323" comment="libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522324" comment="libsamba-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522325" comment="libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522326" comment="libsamdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522327" comment="libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522328" comment="libsmbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522329" comment="libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522330" comment="libsmbconf0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522331" comment="libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522332" comment="libsmbldap0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522333" comment="libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522334" comment="libtevent-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522335" comment="libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522336" comment="libwbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522337" comment="libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522338" comment="samba-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522339" comment="samba-client-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522340" comment="samba-client-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522341" comment="samba-doc-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522342" comment="samba-libs-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522343" comment="samba-libs-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522344" comment="samba-winbind-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522345" comment="samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3019-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193019-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522354" comment="kernel-default-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522355" comment="kernel-default-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522356" comment="kernel-default-extra-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522357" comment="kernel-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522358" comment="kernel-macros-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522359" comment="kernel-source-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522360" comment="kernel-syms-4.12.14-95.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10222" ref_url="https://www.suse.com/security/cve/CVE-2019-10222" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006152.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10222/">CVE-2019-10222</cve>
	<bugzilla href="https://bugzilla.suse.com/1139399">SUSE bug 1139399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145093">SUSE bug 1145093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10557" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10557" ref_url="https://www.suse.com/security/cve/CVE-2019-10557" source="SUSE CVE"/>
    <description>
    Out-of-bound read in the wireless driver in the Linux kernel due to lack of check of buffer length. in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music in APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDX20, SDX55, SXR1130
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-10557/">CVE-2019-10557</cve>
	<bugzilla href="https://bugzilla.suse.com/1159621">SUSE bug 1159621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10649" ref_url="https://www.suse.com/security/cve/CVE-2019-10649" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-10649/">CVE-2019-10649</cve>
	<bugzilla href="https://bugzilla.suse.com/1131154">SUSE bug 1131154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10894" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10895" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10896" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DOF dissector could crash. This was addressed in epan/dissectors/packet-dof.c by properly handling generated IID and OID bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10899" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the SRVLOC dissector could crash. This was addressed in epan/dissectors/packet-srvloc.c by preventing a heap-based buffer under-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS dissector could crash. This was addressed in epan/dissectors/packet-dcerpc-spoolss.c by adding a boundary check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11005" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11005" ref_url="https://www.suse.com/security/cve/CVE-2019-11005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a stack-based buffer overflow in the function SVGStartElement of coders/svg.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a quoted font family value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11005/">CVE-2019-11005</cve>
	<bugzilla href="https://bugzilla.suse.com/1132058">SUSE bug 1132058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11006" ref_url="https://www.suse.com/security/cve/CVE-2019-11006" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadMIFFImage of coders/miff.c, which allows attackers to cause a denial of service or information disclosure via an RLE packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11006/">CVE-2019-11006</cve>
	<bugzilla href="https://bugzilla.suse.com/1132061">SUSE bug 1132061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer overflow in the function WriteXWDImage of coders/xwd.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11009" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11010" ref_url="https://www.suse.com/security/cve/CVE-2019-11010" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a memory leak in the function ReadMPCImage of coders/mpc.c, which allows attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11010/">CVE-2019-11010</cve>
	<bugzilla href="https://bugzilla.suse.com/1132055">SUSE bug 1132055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0594-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html" source="SUSE-SU"/>
    <description>
    When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522663" comment="gd-2.1.0-24.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522664" comment="gd-32bit-2.1.0-24.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1221-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html" source="SUSE-SU"/>
    <description>
    libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521152" comment="libxslt-tools-1.1.28-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521153" comment="libxslt1-1.1.28-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521154" comment="libxslt1-32bit-1.1.28-17.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<bugzilla href="https://bugzilla.suse.com/1132196">SUSE bug 1132196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11085" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085</cve>
	<bugzilla href="https://bugzilla.suse.com/1135278">SUSE bug 1135278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135280">SUSE bug 1135280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135394">SUSE bug 1135394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521465" comment="libvirt-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521466" comment="libvirt-admin-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521467" comment="libvirt-client-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521468" comment="libvirt-daemon-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521469" comment="libvirt-daemon-config-network-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521470" comment="libvirt-daemon-config-nwfilter-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521471" comment="libvirt-daemon-driver-interface-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521472" comment="libvirt-daemon-driver-libxl-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521473" comment="libvirt-daemon-driver-lxc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521474" comment="libvirt-daemon-driver-network-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521475" comment="libvirt-daemon-driver-nodedev-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521476" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521477" comment="libvirt-daemon-driver-qemu-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521478" comment="libvirt-daemon-driver-secret-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521479" comment="libvirt-daemon-driver-storage-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521480" comment="libvirt-daemon-driver-storage-core-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521481" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521482" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521483" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521484" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521485" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521486" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521487" comment="libvirt-daemon-lxc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521488" comment="libvirt-daemon-qemu-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521489" comment="libvirt-daemon-xen-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521490" comment="libvirt-doc-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521491" comment="libvirt-libs-3.3.0-5.33.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521156" comment="qemu-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521157" comment="qemu-block-curl-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521158" comment="qemu-ipxe-1.0.0+-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521159" comment="qemu-kvm-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521160" comment="qemu-seabios-1.10.2-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521161" comment="qemu-sgabios-8-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521162" comment="qemu-tools-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521163" comment="qemu-vgabios-1.10.2-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521164" comment="qemu-x86-2.9.1-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521172" comment="xen-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521173" comment="xen-libs-4.9.4_04-3.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521174" comment="xen-libs-32bit-4.9.4_04-3.53.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521848" comment="libvirt-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521849" comment="libvirt-admin-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521850" comment="libvirt-client-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521851" comment="libvirt-daemon-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521852" comment="libvirt-daemon-config-network-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521853" comment="libvirt-daemon-config-nwfilter-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521854" comment="libvirt-daemon-driver-interface-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521855" comment="libvirt-daemon-driver-libxl-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521856" comment="libvirt-daemon-driver-lxc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521857" comment="libvirt-daemon-driver-network-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521858" comment="libvirt-daemon-driver-nodedev-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521859" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521860" comment="libvirt-daemon-driver-qemu-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521861" comment="libvirt-daemon-driver-secret-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521862" comment="libvirt-daemon-driver-storage-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521863" comment="libvirt-daemon-driver-storage-core-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521864" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521865" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521866" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521867" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521868" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521869" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521870" comment="libvirt-daemon-lxc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521871" comment="libvirt-daemon-qemu-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521872" comment="libvirt-daemon-xen-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521873" comment="libvirt-doc-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521874" comment="libvirt-libs-4.0.0-8.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019563" ref_url="https://www.suse.com/support/kb/doc/?id=000019563" source="SUSE-SU"/>
		<reference ref_id="TID7024251" ref_url="https://www.suse.com/support/kb/doc/?id=7024251" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html" source="SUSE-SU"/>
    <description>
    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152506">SUSE bug 1152506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522354" comment="kernel-default-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522355" comment="kernel-default-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522356" comment="kernel-default-extra-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522357" comment="kernel-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522358" comment="kernel-macros-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522359" comment="kernel-source-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522360" comment="kernel-syms-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522361" comment="qemu-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522362" comment="qemu-block-curl-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522363" comment="qemu-ipxe-1.0.0+-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522364" comment="qemu-kvm-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522365" comment="qemu-seabios-1.11.0-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522366" comment="qemu-sgabios-8-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522367" comment="qemu-tools-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522368" comment="qemu-vgabios-1.11.0-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522369" comment="qemu-x86-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522371" comment="xen-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522372" comment="xen-libs-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522373" comment="xen-libs-32bit-4.11.2_04-2.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html" source="SUSE-SU"/>
    <description>
    Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190</cve>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="TID000019474" ref_url="https://www.suse.com/support/kb/doc/?id=000019474" source="SUSE-SU"/>
		<reference ref_id="TID7023930" ref_url="https://www.suse.com/support/kb/doc/?id=7023930" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522045" comment="kernel-default-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522046" comment="kernel-default-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522047" comment="kernel-default-extra-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522048" comment="kernel-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522049" comment="kernel-macros-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522050" comment="kernel-source-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522051" comment="kernel-syms-4.12.14-95.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11360" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11360" ref_url="https://www.suse.com/security/cve/CVE-2019-11360" source="SUSE CVE"/>
    <description>
    A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-11360/">CVE-2019-11360</cve>
	<bugzilla href="https://bugzilla.suse.com/1141524">SUSE bug 1141524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339058" comment="iptables is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11365" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005410.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11366" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005410.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, there is a crash when dereferencing current-&gt;next.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00089.html" source="SUSE-SU"/>
    <description>
    The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522064" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522065" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11460" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11460" ref_url="https://www.suse.com/security/cve/CVE-2019-11460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00088.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME gnome-desktop 3.26, 3.28, and 3.30 prior to 3.30.2.2, and 3.32 prior to 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal, allowing an attacker to escape the sandbox if the thumbnailer has a controlling terminal. This is due to improper filtering of the TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11460/">CVE-2019-11460</cve>
	<bugzilla href="https://bugzilla.suse.com/1133043">SUSE bug 1133043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334145" comment="gnome-desktop is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11463" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11463" ref_url="https://www.suse.com/security/cve/CVE-2019-11463" source="SUSE CVE"/>
    <description>
    A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11463/">CVE-2019-11463</cve>
	<bugzilla href="https://bugzilla.suse.com/1133130">SUSE bug 1133130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334081" comment="libarchive is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11473" ref_url="https://www.suse.com/security/cve/CVE-2019-11473" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (out-of-bounds read and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-11473/">CVE-2019-11473</cve>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11474" ref_url="https://www.suse.com/security/cve/CVE-2019-11474" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (floating-point exception and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-11474/">CVE-2019-11474</cve>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173667">SUSE bug 1173667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.1-rc5 allows page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498</cve>
	<bugzilla href="https://bugzilla.suse.com/1133384">SUSE bug 1133384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to ExportRedQuantumType in magick/export.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11555" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555</cve>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<bugzilla href="https://bugzilla.suse.com/1131645">SUSE bug 1131645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157905">SUSE bug 1157905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11683" ref_url="https://www.suse.com/security/cve/CVE-2019-11683" source="SUSE CVE"/>
    <description>
    udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11683/">CVE-2019-11683</cve>
	<bugzilla href="https://bugzilla.suse.com/1134021">SUSE bug 1134021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11694" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 60.7.1, Firefox &lt; 67.0.3, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009562509" comment="MozillaFirefox-60.7.1-109.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562510" comment="MozillaFirefox-translations-common-60.7.1-109.77.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR &lt; 60.7.2, Firefox &lt; 67.0.4, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521537" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521538" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11714" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11716" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11718" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11720" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11721" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The unicode latin 'kra' character can be used to spoof a standard 'k' character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11723" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different "containers" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11724" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11725" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11728" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11733" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox &lt; 68.0.2 and Firefox ESR &lt; 68.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11734" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11734" ref_url="https://www.suse.com/security/cve/CVE-2019-11734" source="SUSE CVE"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11734/">CVE-2019-11734</cve>
	<bugzilla href="https://bugzilla.suse.com/1149287">SUSE bug 1149287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<bugzilla href="https://bugzilla.suse.com/1149293">SUSE bug 1149293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11736" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. &lt;br&gt;*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<bugzilla href="https://bugzilla.suse.com/1149292">SUSE bug 1149292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11737" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11737" ref_url="https://www.suse.com/security/cve/CVE-2019-11737" source="SUSE CVE"/>
    <description>
    If a wildcard ('*') is specified for the host in Content Security Policy (CSP) directives, any port or path restriction of the directive will be ignored, leading to CSP directives not being properly applied to content. This vulnerability affects Firefox &lt; 69.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11737/">CVE-2019-11737</cve>
	<bugzilla href="https://bugzilla.suse.com/1149300">SUSE bug 1149300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11738" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<bugzilla href="https://bugzilla.suse.com/1149302">SUSE bug 1149302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11741" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11741" ref_url="https://www.suse.com/security/cve/CVE-2019-11741" source="SUSE CVE"/>
    <description>
    A compromised sandboxed content process can perform a Universal Cross-site Scripting (UXSS) attack on content from any site it can cause to be loaded in the same process. Because addons.mozilla.org and accounts.firefox.com have close ties to the Firefox product, malicious manipulation of these sites within the browser can potentially be used to modify a user's Firefox configuration. These two sites will now be isolated into their own process and not allowed to be loaded in a standard content process. This vulnerability affects Firefox &lt; 69.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11741/">CVE-2019-11741</cve>
	<bugzilla href="https://bugzilla.suse.com/1149288">SUSE bug 1149288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a &amp;lt;canvas&amp;gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Some HTML elements, such as &amp;lt;title&amp;gt; and &amp;lt;textarea&amp;gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html" source="SUSE-SU"/>
    <description>
    When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11747" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The "Forget about this site" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site's HSTS setting will be restored. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<bugzilla href="https://bugzilla.suse.com/1149301">SUSE bug 1149301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11748" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<bugzilla href="https://bugzilla.suse.com/1149291">SUSE bug 1149291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<bugzilla href="https://bugzilla.suse.com/1149290">SUSE bug 1149290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11750" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<bugzilla href="https://bugzilla.suse.com/1149289">SUSE bug 1149289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11751" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. &lt;br&gt;*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<bugzilla href="https://bugzilla.suse.com/1149286">SUSE bug 1149286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11753" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. &lt;br&gt;*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox &lt; 69, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11754" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11754" ref_url="https://www.suse.com/security/cve/CVE-2019-11754" source="SUSE CVE"/>
    <description>
    When the pointer lock is enabled by a website though requestPointerLock(), no user notification is given. This could allow a malicious website to hijack the mouse pointer and confuse users. This vulnerability affects Firefox &lt; 69.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11754/">CVE-2019-11754</cve>
	<bugzilla href="https://bugzilla.suse.com/1151260">SUSE bug 1151260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    When following the value's prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11765" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11765" ref_url="https://www.suse.com/security/cve/CVE-2019-11765" source="SUSE CVE"/>
    <description>
    A compromised content process could send a message to the parent process that would cause the 'Click to Play' permission prompt to be shown. However, due to lack of validation from the parent process, if the user accepted the permission request an attacker-controlled permission would be granted rather than the 'Click to Play' permission. This vulnerability affects Firefox &lt; 70.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11765/">CVE-2019-11765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522045" comment="kernel-default-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522046" comment="kernel-default-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522047" comment="kernel-default-extra-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522048" comment="kernel-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522049" comment="kernel-macros-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522050" comment="kernel-source-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522051" comment="kernel-syms-4.12.14-95.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11811" ref_url="https://www.suse.com/security/cve/CVE-2019-11811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11811/">CVE-2019-11811</cve>
	<bugzilla href="https://bugzilla.suse.com/1134397">SUSE bug 1134397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139868">SUSE bug 1139868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad-&gt;cur_cmd' is null.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067</cve>
	<bugzilla href="https://bugzilla.suse.com/1145642">SUSE bug 1145642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
    <description>
    In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's-&gt;dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522361" comment="qemu-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522362" comment="qemu-block-curl-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522363" comment="qemu-ipxe-1.0.0+-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522364" comment="qemu-kvm-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522365" comment="qemu-seabios-1.11.0-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522366" comment="qemu-sgabios-8-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522367" comment="qemu-tools-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522368" comment="qemu-vgabios-1.11.0-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522369" comment="qemu-x86-2.11.2-5.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
    <description>
    interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522122" comment="qemu-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522123" comment="qemu-block-curl-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522124" comment="qemu-ipxe-1.0.0+-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522125" comment="qemu-kvm-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522126" comment="qemu-seabios-1.11.0-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522127" comment="qemu-sgabios-8-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522128" comment="qemu-tools-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522129" comment="qemu-vgabios-1.11.0-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522130" comment="qemu-x86-2.11.2-5.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12209" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12209" ref_url="https://www.suse.com/security/cve/CVE-2019-12209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005662.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12209/">CVE-2019-12209</cve>
	<bugzilla href="https://bugzilla.suse.com/1087061">SUSE bug 1087061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135727">SUSE bug 1135727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135729">SUSE bug 1135729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521934" comment="libu2f-host0-1.1.6-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521935" comment="pam_u2f-1.0.8-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12210" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12210" ref_url="https://www.suse.com/security/cve/CVE-2019-12210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005662.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00018.html" source="SUSE-SU"/>
    <description>
    In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12210/">CVE-2019-12210</cve>
	<bugzilla href="https://bugzilla.suse.com/1087061">SUSE bug 1087061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135727">SUSE bug 1135727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135729">SUSE bug 1135729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521934" comment="libu2f-host0-1.1.6-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521935" comment="pam_u2f-1.0.8-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12312" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12312" ref_url="https://www.suse.com/security/cve/CVE-2019-12312" source="SUSE CVE"/>
    <description>
    In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by initiating an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normallly expected IKE_AUTH exchange. This affects send_v2N_spi_response_from_state() in programs/pluto/ikev2_send.c that will then trigger a NULL pointer dereference leading to a restart of libreswan.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12312/">CVE-2019-12312</cve>
	<bugzilla href="https://bugzilla.suse.com/1146876">SUSE bug 1146876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333984" comment="strongswan is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12360" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12360" ref_url="https://www.suse.com/security/cve/CVE-2019-12360" source="SUSE CVE"/>
    <description>
    A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12360/">CVE-2019-12360</cve>
	<bugzilla href="https://bugzilla.suse.com/1136620">SUSE bug 1136620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12378" ref_url="https://www.suse.com/security/cve/CVE-2019-12378" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in ip6_ra_control in net/ipv6/ipv6_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This has been disputed as not an issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12378/">CVE-2019-12378</cve>
	<bugzilla href="https://bugzilla.suse.com/1136588">SUSE bug 1136588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12379" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12379" ref_url="https://www.suse.com/security/cve/CVE-2019-12379" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in con_insert_unipair in drivers/tty/vt/consolemap.c in the Linux kernel through 5.1.5. There is a memory leak in a certain case of an ENOMEM outcome of kmalloc. NOTE: This id is disputed as not being an issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12379/">CVE-2019-12379</cve>
	<bugzilla href="https://bugzilla.suse.com/1136602">SUSE bug 1136602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<bugzilla href="https://bugzilla.suse.com/1136598">SUSE bug 1136598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155298">SUSE bug 1155298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12381" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12381" ref_url="https://www.suse.com/security/cve/CVE-2019-12381" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12381/">CVE-2019-12381</cve>
	<bugzilla href="https://bugzilla.suse.com/1136593">SUSE bug 1136593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155298">SUSE bug 1155298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12435" ref_url="https://www.suse.com/security/cve/CVE-2019-12435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1574-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005626.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer dereference, leading to Denial of Service. This is related to the AD DC DNS management server (dnsserver) RPC server process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12435/">CVE-2019-12435</cve>
	<bugzilla href="https://bugzilla.suse.com/1137815">SUSE bug 1137815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12436" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12436" ref_url="https://www.suse.com/security/cve/CVE-2019-12436" source="SUSE CVE"/>
    <description>
    Samba 4.10.x before 4.10.5 has a NULL pointer dereference, leading to an AD DC LDAP server Denial of Service. This is related to an attacker using the paged search control. The attacker must have directory read access in order to attempt an exploit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12436/">CVE-2019-12436</cve>
	<bugzilla href="https://bugzilla.suse.com/1137816">SUSE bug 1137816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12447" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12447" ref_url="https://www.suse.com/security/cve/CVE-2019-12447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12447/">CVE-2019-12447</cve>
	<bugzilla href="https://bugzilla.suse.com/1136986">SUSE bug 1136986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334147" comment="gvfs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12448" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12448" ref_url="https://www.suse.com/security/cve/CVE-2019-12448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12448/">CVE-2019-12448</cve>
	<bugzilla href="https://bugzilla.suse.com/1136981">SUSE bug 1136981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334147" comment="gvfs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12449" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12449" ref_url="https://www.suse.com/security/cve/CVE-2019-12449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file's user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12449/">CVE-2019-12449</cve>
	<bugzilla href="https://bugzilla.suse.com/1136992">SUSE bug 1136992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334147" comment="gvfs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00076.html" source="SUSE-SU"/>
    <description>
    file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142126">SUSE bug 1142126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521552" comment="libgio-fam-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12454" ref_url="https://www.suse.com/security/cve/CVE-2019-12454" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in wcd9335_codec_enable_dec in sound/soc/codecs/wcd9335.c in the Linux kernel through 5.1.5. It uses kstrndup instead of kmemdup_nul, which allows attackers to have an unspecified impact via unknown vectors. NOTE: The vendor disputes this issues as not being a vulnerability because switching to kmemdup_nul() would only fix a security issue if the source string wasn't NUL-terminated, which is not the case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12454/">CVE-2019-12454</cve>
	<bugzilla href="https://bugzilla.suse.com/1136963">SUSE bug 1136963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12455" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12455" ref_url="https://www.suse.com/security/cve/CVE-2019-12455" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue because “The memory allocation that was not checked is part of a code that only runs at boot time, before user processes are started. Therefore, there is no possibility for an unprivileged user to control it, and no denial of service.”.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12455/">CVE-2019-12455</cve>
	<bugzilla href="https://bugzilla.suse.com/1136946">SUSE bug 1136946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a "double fetch" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136993">SUSE bug 1136993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12493" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12493" ref_url="https://www.suse.com/security/cve/CVE-2019-12493" source="SUSE CVE"/>
    <description>
    A stack-based buffer over-read exists in PostScriptFunction::transform in Function.cc in Xpdf 4.01.01 because GfxSeparationColorSpace and GfxDeviceNColorSpace mishandle tint transform functions. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12493/">CVE-2019-12493</cve>
	<bugzilla href="https://bugzilla.suse.com/1136998">SUSE bug 1136998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-&gt;name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12615" ref_url="https://www.suse.com/security/cve/CVE-2019-12615" source="SUSE CVE"/>
    <description>
    An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info-&gt;vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12615/">CVE-2019-12615</cve>
	<bugzilla href="https://bugzilla.suse.com/1137195">SUSE bug 1137195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12625" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1561-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00075.html" source="SUSE-SU"/>
    <description>
    getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521427" comment="gvim-7.4.326-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521428" comment="vim-7.4.326-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006978.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html" source="SUSE-SU"/>
    <description>
    dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522634" comment="dbus-1-1.8.22-29.17.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522635" comment="dbus-1-x11-1.8.22-29.17.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522636" comment="libdbus-1-3-1.8.22-29.17.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522637" comment="libdbus-1-3-32bit-1.8.22-29.17.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12817" ref_url="https://www.suse.com/security/cve/CVE-2019-12817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-12817/">CVE-2019-12817</cve>
	<bugzilla href="https://bugzilla.suse.com/1138263">SUSE bug 1138263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138264">SUSE bug 1138264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<bugzilla href="https://bugzilla.suse.com/1138293">SUSE bug 1138293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2004-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192004-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1781-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1918-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12904" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12904" ref_url="https://www.suse.com/security/cve/CVE-2019-12904" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005751.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00049.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12904/">CVE-2019-12904</cve>
	<bugzilla href="https://bugzilla.suse.com/1138939">SUSE bug 1138939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334024" comment="libgcrypt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12928" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12928" ref_url="https://www.suse.com/security/cve/CVE-2019-12928" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12928/">CVE-2019-12928</cve>
	<bugzilla href="https://bugzilla.suse.com/1139714">SUSE bug 1139714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140124">SUSE bug 1140124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12929" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12929" ref_url="https://www.suse.com/security/cve/CVE-2019-12929" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="0/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12929/">CVE-2019-12929</cve>
	<bugzilla href="https://bugzilla.suse.com/1139671">SUSE bug 1139671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140123">SUSE bug 1140123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974</cve>
	<bugzilla href="https://bugzilla.suse.com/1140111">SUSE bug 1140111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12977" ref_url="https://www.suse.com/security/cve/CVE-2019-12977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12977/">CVE-2019-12977</cve>
	<bugzilla href="https://bugzilla.suse.com/1139884">SUSE bug 1139884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978</cve>
	<bugzilla href="https://bugzilla.suse.com/1139885">SUSE bug 1139885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13012" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1830-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1749-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00022.html" source="SUSE-SU"/>
    <description>
    The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb-&gt;dir, NULL, NULL) and files using g_file_replace_contents (kfsb-&gt;file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012</cve>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142126">SUSE bug 1142126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521947" comment="libgio-fam-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2006-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192006-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1917-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" source="SUSE-SU"/>
    <description>
    Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050</cve>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522220" comment="gpg2-2.0.24-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522221" comment="gpg2-lang-2.0.24-9.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522153" comment="libldap-2_4-2-2.4.41-18.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522154" comment="libldap-2_4-2-32bit-2.4.41-18.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522155" comment="openldap2-client-2.4.41-18.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522156" comment="openldap2-doc-2.4.41-18.63.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13108" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13108" ref_url="https://www.suse.com/security/cve/CVE-2019-13108" source="SUSE CVE"/>
    <description>
    An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13108/">CVE-2019-13108</cve>
	<bugzilla href="https://bugzilla.suse.com/1142675">SUSE bug 1142675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13109" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13109" ref_url="https://www.suse.com/security/cve/CVE-2019-13109" source="SUSE CVE"/>
    <description>
    An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13109/">CVE-2019-13109</cve>
	<bugzilla href="https://bugzilla.suse.com/1142677">SUSE bug 1142677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13111" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13111" ref_url="https://www.suse.com/security/cve/CVE-2019-13111" source="SUSE CVE"/>
    <description>
    A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13111/">CVE-2019-13111</cve>
	<bugzilla href="https://bugzilla.suse.com/1142679">SUSE bug 1142679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13114" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13114" ref_url="https://www.suse.com/security/cve/CVE-2019-13114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13114/">CVE-2019-13114</cve>
	<bugzilla href="https://bugzilla.suse.com/1142684">SUSE bug 1142684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13115" ref_url="https://www.suse.com/security/cve/CVE-2019-13115" source="SUSE CVE"/>
    <description>
    In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13115/">CVE-2019-13115</cve>
	<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334087" comment="libssh2_org is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521987" comment="libxslt-tools-1.1.28-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521988" comment="libxslt1-1.1.28-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521989" comment="libxslt1-32bit-1.1.28-17.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13118" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118</cve>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521987" comment="libxslt-tools-1.1.28-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521988" comment="libxslt1-1.1.28-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521989" comment="libxslt1-32bit-1.1.28-17.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13132" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005675.html" source="SUSE-SU"/>
		<reference ref_id="TID000019475" ref_url="https://www.suse.com/support/kb/doc/?id=000019475" source="SUSE-SU"/>
		<reference ref_id="TID7023929" ref_url="https://www.suse.com/support/kb/doc/?id=7023929" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132</cve>
	<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521940" comment="libzmq3-4.0.4-15.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13134" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13136" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13136" ref_url="https://www.suse.com/security/cve/CVE-2019-13136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13136/">CVE-2019-13136</cve>
	<bugzilla href="https://bugzilla.suse.com/1140104">SUSE bug 1140104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13137" ref_url="https://www.suse.com/security/cve/CVE-2019-13137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13137/">CVE-2019-13137</cve>
	<bugzilla href="https://bugzilla.suse.com/1140105">SUSE bug 1140105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
    <description>
    qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522122" comment="qemu-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522123" comment="qemu-block-curl-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522124" comment="qemu-ipxe-1.0.0+-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522125" comment="qemu-kvm-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522126" comment="qemu-seabios-1.11.0-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522127" comment="qemu-sgabios-8-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522128" comment="qemu-tools-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522129" comment="qemu-vgabios-1.11.0-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522130" comment="qemu-x86-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13233" ref_url="https://www.suse.com/security/cve/CVE-2019-13233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13233/">CVE-2019-13233</cve>
	<bugzilla href="https://bugzilla.suse.com/1140454">SUSE bug 1140454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144502">SUSE bug 1144502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13272" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198122">SUSE bug 1198122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13282" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13282" ref_url="https://www.suse.com/security/cve/CVE-2019-13282" source="SUSE CVE"/>
    <description>
    In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in SampledFunction::transform in Function.cc when using a large index for samples. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13282/">CVE-2019-13282</cve>
	<bugzilla href="https://bugzilla.suse.com/1140870">SUSE bug 1140870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13286" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13286" ref_url="https://www.suse.com/security/cve/CVE-2019-13286" source="SUSE CVE"/>
    <description>
    In Xpdf 4.01.01, there is a heap-based buffer over-read in the function JBIG2Stream::readTextRegionSeg() located at JBIG2Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13286/">CVE-2019-13286</cve>
	<bugzilla href="https://bugzilla.suse.com/1140744">SUSE bug 1140744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13287" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13287" ref_url="https://www.suse.com/security/cve/CVE-2019-13287" source="SUSE CVE"/>
    <description>
    In Xpdf 4.01.01, there is an out-of-bounds read vulnerability in the function SplashXPath::strokeAdjust() located at splash/SplashXPath.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure. This is related to CVE-2018-16368.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13287/">CVE-2019-13287</cve>
	<bugzilla href="https://bugzilla.suse.com/1140745">SUSE bug 1140745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13288" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13288" ref_url="https://www.suse.com/security/cve/CVE-2019-13288" source="SUSE CVE"/>
    <description>
    In Xpdf 4.01.01, the Parser::getObj() function in Parser.cc may cause infinite recursion via a crafted file. A remote attacker can leverage this for a DoS attack. This is similar to CVE-2018-16646.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13288/">CVE-2019-13288</cve>
	<bugzilla href="https://bugzilla.suse.com/1140882">SUSE bug 1140882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13291" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13291" ref_url="https://www.suse.com/security/cve/CVE-2019-13291" source="SUSE CVE"/>
    <description>
    In Xpdf 4.01.01, there is a heap-based buffer over-read in the function DCTStream::readScan() located at Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Information Disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13291/">CVE-2019-13291</cve>
	<bugzilla href="https://bugzilla.suse.com/1140746">SUSE bug 1140746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13296" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296</cve>
	<bugzilla href="https://bugzilla.suse.com/1140665">SUSE bug 1140665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13298" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13298" ref_url="https://www.suse.com/security/cve/CVE-2019-13298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13298/">CVE-2019-13298</cve>
	<bugzilla href="https://bugzilla.suse.com/1140667">SUSE bug 1140667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13299" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13299" ref_url="https://www.suse.com/security/cve/CVE-2019-13299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13299/">CVE-2019-13299</cve>
	<bugzilla href="https://bugzilla.suse.com/1140668">SUSE bug 1140668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300</cve>
	<bugzilla href="https://bugzilla.suse.com/1140669">SUSE bug 1140669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13302" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13302" ref_url="https://www.suse.com/security/cve/CVE-2019-13302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13302/">CVE-2019-13302</cve>
	<bugzilla href="https://bugzilla.suse.com/1140552">SUSE bug 1140552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13303" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13303" ref_url="https://www.suse.com/security/cve/CVE-2019-13303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13303/">CVE-2019-13303</cve>
	<bugzilla href="https://bugzilla.suse.com/1140549">SUSE bug 1140549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304</cve>
	<bugzilla href="https://bugzilla.suse.com/1140547">SUSE bug 1140547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305</cve>
	<bugzilla href="https://bugzilla.suse.com/1140545">SUSE bug 1140545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306</cve>
	<bugzilla href="https://bugzilla.suse.com/1140543">SUSE bug 1140543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307</cve>
	<bugzilla href="https://bugzilla.suse.com/1140538">SUSE bug 1140538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308</cve>
	<bugzilla href="https://bugzilla.suse.com/1140534">SUSE bug 1140534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391</cve>
	<bugzilla href="https://bugzilla.suse.com/1140673">SUSE bug 1140673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522153" comment="libldap-2_4-2-2.4.41-18.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522154" comment="libldap-2_4-2-32bit-2.4.41-18.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522155" comment="openldap2-client-2.4.41-18.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522156" comment="openldap2-doc-2.4.41-18.63.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13619" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619</cve>
	<bugzilla href="https://bugzilla.suse.com/1141980">SUSE bug 1141980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522075" comment="libwireshark9-2.4.16-48.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522076" comment="libwiretap7-2.4.16-48.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522077" comment="libwscodecs1-2.4.16-48.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522078" comment="libwsutil8-2.4.16-48.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522079" comment="wireshark-2.4.16-48.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522080" comment="wireshark-gtk-2.4.16-48.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006291.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html" source="SUSE-SU"/>
    <description>
    It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522045" comment="kernel-default-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522046" comment="kernel-default-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522047" comment="kernel-default-extra-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522048" comment="kernel-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522049" comment="kernel-macros-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522050" comment="kernel-source-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522051" comment="kernel-syms-4.12.14-95.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648</cve>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142265">SUSE bug 1142265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522045" comment="kernel-default-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522046" comment="kernel-default-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522047" comment="kernel-default-extra-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522048" comment="kernel-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522049" comment="kernel-macros-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522050" comment="kernel-source-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522051" comment="kernel-syms-4.12.14-95.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13722" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522045" comment="kernel-default-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522046" comment="kernel-default-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522047" comment="kernel-default-extra-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522048" comment="kernel-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522049" comment="kernel-macros-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522050" comment="kernel-source-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522051" comment="kernel-syms-4.12.14-95.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522045" comment="kernel-default-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522046" comment="kernel-default-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522047" comment="kernel-default-extra-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522048" comment="kernel-devel-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522049" comment="kernel-macros-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522050" comment="kernel-source-4.12.14-95.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522051" comment="kernel-syms-4.12.14-95.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2656-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192656-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156093">SUSE bug 1156093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522249" comment="sudo-1.8.20p2-3.14.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14288" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14288" ref_url="https://www.suse.com/security/cve/CVE-2019-14288" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an Integer overflow in the function JBIG2Bitmap::combine at JBIG2Stream.cc for the "one byte per line" case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14288/">CVE-2019-14288</cve>
	<bugzilla href="https://bugzilla.suse.com/1143434">SUSE bug 1143434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14289" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14289" ref_url="https://www.suse.com/security/cve/CVE-2019-14289" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an integer overflow in the function JBIG2Bitmap::combine at JBIG2Stream.cc for the "multiple bytes per line" case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14289/">CVE-2019-14289</cve>
	<bugzilla href="https://bugzilla.suse.com/1143443">SUSE bug 1143443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14290" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14290" ref_url="https://www.suse.com/security/cve/CVE-2019-14290" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14290/">CVE-2019-14290</cve>
	<bugzilla href="https://bugzilla.suse.com/1143568">SUSE bug 1143568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14291" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14291" ref_url="https://www.suse.com/security/cve/CVE-2019-14291" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14291/">CVE-2019-14291</cve>
	<bugzilla href="https://bugzilla.suse.com/1143569">SUSE bug 1143569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14293" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14293" ref_url="https://www.suse.com/security/cve/CVE-2019-14293" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA!=6 case 2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14293/">CVE-2019-14293</cve>
	<bugzilla href="https://bugzilla.suse.com/1143571">SUSE bug 1143571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14294" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14294" ref_url="https://www.suse.com/security/cve/CVE-2019-14294" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is a use-after-free in the function JPXStream::fillReadBuf at JPXStream.cc, due to an out of bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14294/">CVE-2019-14294</cve>
	<bugzilla href="https://bugzilla.suse.com/1143572">SUSE bug 1143572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14368" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14368" ref_url="https://www.suse.com/security/cve/CVE-2019-14368" source="SUSE CVE"/>
    <description>
    Exiv2 0.27.99.0 has a heap-based buffer over-read in Exiv2::RafImage::readMetadata() in rafimage.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14368/">CVE-2019-14368</cve>
	<bugzilla href="https://bugzilla.suse.com/1143278">SUSE bug 1143278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14369" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14369" ref_url="https://www.suse.com/security/cve/CVE-2019-14369" source="SUSE CVE"/>
    <description>
    Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14369/">CVE-2019-14369</cve>
	<bugzilla href="https://bugzilla.suse.com/1141472">SUSE bug 1141472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143280">SUSE bug 1143280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14370" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14370" ref_url="https://www.suse.com/security/cve/CVE-2019-14370" source="SUSE CVE"/>
    <description>
    In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in mrwimage.cpp. It could result in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14370/">CVE-2019-14370</cve>
	<bugzilla href="https://bugzilla.suse.com/1143281">SUSE bug 1143281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
    <description>
    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522122" comment="qemu-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522123" comment="qemu-block-curl-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522124" comment="qemu-ipxe-1.0.0+-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522125" comment="qemu-kvm-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522126" comment="qemu-seabios-1.11.0-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522127" comment="qemu-sgabios-8-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522128" comment="qemu-tools-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522129" comment="qemu-vgabios-1.11.0-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522130" comment="qemu-x86-2.11.2-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14513" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14513" ref_url="https://www.suse.com/security/cve/CVE-2019-14513" source="SUSE CVE"/>
    <description>
    Improper bounds checking in Dnsmasq before 2.76 allows an attacker controlled DNS server to send large DNS packets that result in a read operation beyond the buffer allocated for the packet, a different vulnerability than CVE-2017-14491.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14513/">CVE-2019-14513</cve>
	<bugzilla href="https://bugzilla.suse.com/1143944">SUSE bug 1143944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338972" comment="dnsmasq is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14655" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14655" ref_url="https://www.suse.com/security/cve/CVE-2019-14655" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14655/">CVE-2019-14655</cve>
	<bugzilla href="https://bugzilla.suse.com/1144359">SUSE bug 1144359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334320" comment="net-snmp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14763" ref_url="https://www.suse.com/security/cve/CVE-2019-14763" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14763/">CVE-2019-14763</cve>
	<bugzilla href="https://bugzilla.suse.com/1144918">SUSE bug 1144918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173664">SUSE bug 1173664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-&gt;first' and 'ring-&gt;last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00074.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522147" comment="ibus-gtk3-32bit-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522150" comment="libibus-1_0-5-32bit-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522151" comment="python-ibus-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14833" ref_url="https://www.suse.com/security/cve/CVE-2019-14833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2866-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192866-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2868-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192868-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14833/">CVE-2019-14833</cve>
	<bugzilla href="https://bugzilla.suse.com/1154289">SUSE bug 1154289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14834" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00027.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522648" comment="dnsmasq-2.78-18.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14847" ref_url="https://www.suse.com/security/cve/CVE-2019-14847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2866-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192866-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2868-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192868-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14847/">CVE-2019-14847</cve>
	<bugzilla href="https://bugzilla.suse.com/1154598">SUSE bug 1154598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14861" ref_url="https://www.suse.com/security/cve/CVE-2019-14861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3318-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193318-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" source="SUSE-SU"/>
    <description>
    All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14861/">CVE-2019-14861</cve>
	<bugzilla href="https://bugzilla.suse.com/1158108">SUSE bug 1158108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14865" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14865" ref_url="https://www.suse.com/security/cve/CVE-2019-14865" source="SUSE CVE"/>
    <description>
    A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14865/">CVE-2019-14865</cve>
	<bugzilla href="https://bugzilla.suse.com/1157767">SUSE bug 1157767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338902" comment="grub2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00076.html" source="SUSE-SU"/>
    <description>
    In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866</cve>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522399" comment="cpio-2.11-36.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522400" comment="cpio-lang-2.11-36.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3318-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193318-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" source="SUSE-SU"/>
    <description>
    All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870</cve>
	<bugzilla href="https://bugzilla.suse.com/1158109">SUSE bug 1158109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14889" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:21-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html" source="SUSE-SU"/>
    <description>
    A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889</cve>
	<bugzilla href="https://bugzilla.suse.com/1158095">SUSE bug 1158095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522533" comment="libssh4-0.6.3-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522534" comment="libssh4-32bit-0.6.3-12.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173660">SUSE bug 1173660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14898" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14898" ref_url="https://www.suse.com/security/cve/CVE-2019-14898" source="SUSE CVE"/>
    <description>
    The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-16"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-14898/">CVE-2019-14898</cve>
	<bugzilla href="https://bugzilla.suse.com/1157905">SUSE bug 1157905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14902" ref_url="https://www.suse.com/security/cve/CVE-2019-14902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" source="SUSE-SU"/>
    <description>
    There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14902/">CVE-2019-14902</cve>
	<bugzilla href="https://bugzilla.suse.com/1160850">SUSE bug 1160850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" source="SUSE-SU"/>
    <description>
    All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907</cve>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522551" comment="libdcerpc-binding0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522552" comment="libdcerpc-binding0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522553" comment="libdcerpc0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522554" comment="libdcerpc0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522555" comment="libndr-krb5pac0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522556" comment="libndr-krb5pac0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522557" comment="libndr-nbt0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522558" comment="libndr-nbt0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522559" comment="libndr-standard0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522560" comment="libndr-standard0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522561" comment="libndr0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522562" comment="libndr0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522563" comment="libnetapi0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522564" comment="libnetapi0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522565" comment="libsamba-credentials0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522566" comment="libsamba-credentials0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522567" comment="libsamba-errors0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522568" comment="libsamba-errors0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522569" comment="libsamba-hostconfig0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522570" comment="libsamba-hostconfig0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522571" comment="libsamba-passdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522572" comment="libsamba-passdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522573" comment="libsamba-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522574" comment="libsamba-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522575" comment="libsamdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522576" comment="libsamdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522577" comment="libsmbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522578" comment="libsmbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522579" comment="libsmbconf0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522580" comment="libsmbconf0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522581" comment="libsmbldap0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522582" comment="libsmbldap0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522583" comment="libtevent-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522584" comment="libtevent-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522585" comment="libwbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522586" comment="libwbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522587" comment="samba-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522588" comment="samba-client-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522589" comment="samba-client-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522590" comment="samba-doc-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522591" comment="samba-libs-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522592" comment="samba-libs-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522593" comment="samba-winbind-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522594" comment="samba-winbind-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1561-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00023.html" source="SUSE-SU"/>
    <description>
    _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973</cve>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522397" comment="libtiff5-4.0.9-44.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522398" comment="libtiff5-32bit-4.0.9-44.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14980" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981</cve>
	<bugzilla href="https://bugzilla.suse.com/1146065">SUSE bug 1146065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14982" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14982" ref_url="https://www.suse.com/security/cve/CVE-2019-14982" source="SUSE CVE"/>
    <description>
    In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14982/">CVE-2019-14982</cve>
	<bugzilla href="https://bugzilla.suse.com/1146294">SUSE bug 1146294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15031" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15034" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15034" ref_url="https://www.suse.com/security/cve/CVE-2019-15034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15034/">CVE-2019-15034</cve>
	<bugzilla href="https://bugzilla.suse.com/1166379">SUSE bug 1166379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15090" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090</cve>
	<bugzilla href="https://bugzilla.suse.com/1146399">SUSE bug 1146399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<bugzilla href="https://bugzilla.suse.com/1146368">SUSE bug 1146368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173934">SUSE bug 1173934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15141" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_dirwrite.c of LibTIFF. NOTE: this occurs because of an incomplete fix for CVE-2019-11597.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" source="SUSE-SU"/>
    <description>
    In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142</cve>
	<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522217" comment="libdjvulibre21-3.5.25.3-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" source="SUSE-SU"/>
    <description>
    In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143</cve>
	<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522217" comment="libdjvulibre21-3.5.25.3-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" source="SUSE-SU"/>
    <description>
    In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate&lt;TYPE&gt;::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144</cve>
	<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522217" comment="libdjvulibre21-3.5.25.3-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" source="SUSE-SU"/>
    <description>
    DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145</cve>
	<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522217" comment="libdjvulibre21-3.5.25.3-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15165" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html" source="SUSE-SU"/>
    <description>
    sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522251" comment="libpcap1-32bit-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15211" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15212" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15216" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15219" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15222" ref_url="https://www.suse.com/security/cve/CVE-2019-15222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15222/">CVE-2019-15222</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146531">SUSE bug 1146531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15223" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15223" ref_url="https://www.suse.com/security/cve/CVE-2019-15223" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/driver.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15223/">CVE-2019-15223</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146535">SUSE bug 1146535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239</cve>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15290" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15292" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173939">SUSE bug 1173939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543</cve>
	<bugzilla href="https://bugzilla.suse.com/1128189">SUSE bug 1128189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522500" comment="libopenssl1_1-1.1.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522501" comment="libopenssl1_1-32bit-1.1.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154166">SUSE bug 1154166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161085">SUSE bug 1161085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522232" comment="libopenssl-1_0_0-devel-1.0.2p-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522243" comment="libopenssl0_9_8-0.9.8j-106.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522244" comment="libopenssl0_9_8-32bit-0.9.8j-106.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522233" comment="libopenssl1_0_0-1.0.2p-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522234" comment="libopenssl1_0_0-32bit-1.0.2p-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522688" comment="libopenssl1_1-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522689" comment="libopenssl1_1-32bit-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522235" comment="openssl-1_0_0-1.0.2p-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522690" comment="openssl-1_1-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
    <description>
    OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549</cve>
	<bugzilla href="https://bugzilla.suse.com/1150247">SUSE bug 1150247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522688" comment="libopenssl1_1-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522689" comment="libopenssl1_1-32bit-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522690" comment="openssl-1_1-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333943" comment="openssl-1_0_0 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15504" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504" source="SUSE CVE"/>
    <description>
    drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504</cve>
	<bugzilla href="https://bugzilla.suse.com/1147116">SUSE bug 1147116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185852">SUSE bug 1185852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522600" comment="libopenssl-1_0_0-devel-1.0.2p-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522601" comment="libopenssl1_0_0-1.0.2p-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522602" comment="libopenssl1_0_0-32bit-1.0.2p-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522688" comment="libopenssl1_1-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522689" comment="libopenssl1_1-32bit-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522603" comment="openssl-1_0_0-1.0.2p-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522690" comment="openssl-1_1-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1552" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1552" ref_url="https://www.suse.com/security/cve/CVE-2019-1552" source="SUSE CVE"/>
    <description>
    OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-1552/">CVE-2019-1552</cve>
	<bugzilla href="https://bugzilla.suse.com/1143552">SUSE bug 1143552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333943" comment="openssl-1_0_0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15538" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15538" ref_url="https://www.suse.com/security/cve/CVE-2019-15538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vector, but it might result as well in remote DoS if the XFS filesystem is exported for instance via NFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15538/">CVE-2019-15538</cve>
	<bugzilla href="https://bugzilla.suse.com/1148093">SUSE bug 1148093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00173.html" source="SUSE-SU"/>
    <description>
    If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521711" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521527" comment="libopenssl0_9_8-0.9.8j-106.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521712" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521713" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521714" comment="openssl-1.0.2j-60.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522485" comment="libopenssl-1_0_0-devel-1.0.2p-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521527" comment="libopenssl0_9_8-0.9.8j-106.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522486" comment="libopenssl1_0_0-1.0.2p-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522487" comment="libopenssl1_0_0-32bit-1.0.2p-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522488" comment="openssl-1_0_0-1.0.2p-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15601" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15601" ref_url="https://www.suse.com/security/cve/CVE-2019-15601" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15601/">CVE-2019-15601</cve>
	<bugzilla href="https://bugzilla.suse.com/1160301">SUSE bug 1160301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" source="SUSE-SU"/>
    <description>
    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522232" comment="libopenssl-1_0_0-devel-1.0.2p-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522243" comment="libopenssl0_9_8-0.9.8j-106.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522244" comment="libopenssl0_9_8-32bit-0.9.8j-106.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522233" comment="libopenssl1_0_0-1.0.2p-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522234" comment="libopenssl1_0_0-32bit-1.0.2p-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522688" comment="libopenssl1_1-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522689" comment="libopenssl1_1-32bit-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522235" comment="openssl-1_0_0-1.0.2p-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522690" comment="openssl-1_1-1.1.1d-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15791" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15791" ref_url="https://www.suse.com/security/cve/CVE-2019-15791" source="SUSE CVE"/>
    <description>
    In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15791/">CVE-2019-15791</cve>
	<bugzilla href="https://bugzilla.suse.com/1156640">SUSE bug 1156640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15794" ref_url="https://www.suse.com/security/cve/CVE-2019-15794" source="SUSE CVE"/>
    <description>
    Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma-&gt;vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15794/">CVE-2019-15794</cve>
	<bugzilla href="https://bugzilla.suse.com/1158156">SUSE bug 1158156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15847" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334154" comment="gcc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334155" comment="gcc33 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334156" comment="gcc48 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream "x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522214" comment="expat-2.1.0-21.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522215" comment="libexpat1-2.1.0-21.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522216" comment="libexpat1-32bit-2.1.0-21.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916</cve>
	<bugzilla href="https://bugzilla.suse.com/1149448">SUSE bug 1149448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917</cve>
	<bugzilla href="https://bugzilla.suse.com/1149539">SUSE bug 1149539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156334">SUSE bug 1156334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15919" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15919" ref_url="https://www.suse.com/security/cve/CVE-2019-15919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15919/">CVE-2019-15919</cve>
	<bugzilla href="https://bugzilla.suse.com/1149552">SUSE bug 1149552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172957">SUSE bug 1172957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15920" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15920" ref_url="https://www.suse.com/security/cve/CVE-2019-15920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15920/">CVE-2019-15920</cve>
	<bugzilla href="https://bugzilla.suse.com/1149626">SUSE bug 1149626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156335">SUSE bug 1156335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15921" ref_url="https://www.suse.com/security/cve/CVE-2019-15921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15921/">CVE-2019-15921</cve>
	<bugzilla href="https://bugzilla.suse.com/1149602">SUSE bug 1149602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15922" ref_url="https://www.suse.com/security/cve/CVE-2019-15922" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a NULL pointer dereference for a pf data structure if alloc_disk fails in drivers/block/paride/pf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15922/">CVE-2019-15922</cve>
	<bugzilla href="https://bugzilla.suse.com/1149607">SUSE bug 1149607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15923" ref_url="https://www.suse.com/security/cve/CVE-2019-15923" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a NULL pointer dereference for a cd data structure if alloc_disk fails in drivers/block/paride/pf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15923/">CVE-2019-15923</cve>
	<bugzilla href="https://bugzilla.suse.com/1149609">SUSE bug 1149609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15925" ref_url="https://www.suse.com/security/cve/CVE-2019-15925" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. An out of bounds access exists in the function hclge_tm_schd_mode_vnet_base_cfg in the file drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15925/">CVE-2019-15925</cve>
	<bugzilla href="https://bugzilla.suse.com/1149532">SUSE bug 1149532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15961" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180082">SUSE bug 1180082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522421" comment="clamav-0.100.3-33.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522264" comment="libpython2_7-1_0-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522265" comment="libpython2_7-1_0-32bit-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522289" comment="libpython3_4m1_0-3.4.6-25.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522266" comment="python-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522267" comment="python-base-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522268" comment="python-curses-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522269" comment="python-devel-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522270" comment="python-tk-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522271" comment="python-xml-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522290" comment="python3-3.4.6-25.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522291" comment="python3-base-3.4.6-25.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522292" comment="python3-curses-3.4.6-25.34.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16088" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16088" ref_url="https://www.suse.com/security/cve/CVE-2019-16088" source="SUSE CVE"/>
    <description>
    Xpdf 3.04 has a SIGSEGV in XRef::fetch in XRef.cc after many recursive calls to Catalog::countPageTree in Catalog.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16088/">CVE-2019-16088</cve>
	<bugzilla href="https://bugzilla.suse.com/1150205">SUSE bug 1150205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16089" ref_url="https://www.suse.com/security/cve/CVE-2019-16089" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16089/">CVE-2019-16089</cve>
	<bugzilla href="https://bugzilla.suse.com/1150004">SUSE bug 1150004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16167" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2752-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2397-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html" source="SUSE-SU"/>
    <description>
    sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167</cve>
	<bugzilla href="https://bugzilla.suse.com/1150114">SUSE bug 1150114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522272" comment="sysstat-12.0.2-10.27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html" source="SUSE-SU"/>
    <description>
    In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168</cve>
	<bugzilla href="https://bugzilla.suse.com/1150137">SUSE bug 1150137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522240" comment="libsqlite3-0-3.8.10.2-9.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522241" comment="libsqlite3-0-32bit-3.8.10.2-9.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522242" comment="sqlite3-3.8.10.2-9.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16229" ref_url="https://www.suse.com/security/cve/CVE-2019-16229" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16229/">CVE-2019-16229</cve>
	<bugzilla href="https://bugzilla.suse.com/1150469">SUSE bug 1150469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
    <description>
    drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522354" comment="kernel-default-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522355" comment="kernel-default-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522356" comment="kernel-default-extra-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522357" comment="kernel-devel-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522358" comment="kernel-macros-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522359" comment="kernel-source-4.12.14-95.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522360" comment="kernel-syms-4.12.14-95.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16239" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16239" ref_url="https://www.suse.com/security/cve/CVE-2019-16239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2744-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html" source="SUSE-SU"/>
    <description>
    process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16239/">CVE-2019-16239</cve>
	<bugzilla href="https://bugzilla.suse.com/1151178">SUSE bug 1151178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522261" comment="openconnect-7.08-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522262" comment="openconnect-lang-7.08-3.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16319" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16319" ref_url="https://www.suse.com/security/cve/CVE-2019-16319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16319/">CVE-2019-16319</cve>
	<bugzilla href="https://bugzilla.suse.com/1150690">SUSE bug 1150690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711</cve>
	<bugzilla href="https://bugzilla.suse.com/1151784">SUSE bug 1151784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712</cve>
	<bugzilla href="https://bugzilla.suse.com/1151785">SUSE bug 1151785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16714" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16714" ref_url="https://www.suse.com/security/cve/CVE-2019-16714" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-16714/">CVE-2019-16714</cve>
	<bugzilla href="https://bugzilla.suse.com/1151791">SUSE bug 1151791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16905" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16905" ref_url="https://www.suse.com/security/cve/CVE-2019-16905" source="SUSE CVE"/>
    <description>
    OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16905/">CVE-2019-16905</cve>
	<bugzilla href="https://bugzilla.suse.com/1153537">SUSE bug 1153537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16921" ref_url="https://www.suse.com/security/cve/CVE-2019-16921" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-16921/">CVE-2019-16921</cve>
	<bugzilla href="https://bugzilla.suse.com/1152516">SUSE bug 1152516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16927" ref_url="https://www.suse.com/security/cve/CVE-2019-16927" source="SUSE CVE"/>
    <description>
    Xpdf 4.01.01 has an out-of-bounds write in the vertProfile part of the TextPage::findGaps function in TextOutputDev.cc, a different vulnerability than CVE-2019-9877.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16927/">CVE-2019-16927</cve>
	<bugzilla href="https://bugzilla.suse.com/1154829">SUSE bug 1154829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522264" comment="libpython2_7-1_0-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522265" comment="libpython2_7-1_0-32bit-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522266" comment="python-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522267" comment="python-base-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522268" comment="python-curses-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522269" comment="python-devel-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522270" comment="python-tk-2.7.13-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522271" comment="python-xml-2.7.13-28.36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17000" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17000" ref_url="https://www.suse.com/security/cve/CVE-2019-17000" source="SUSE CVE"/>
    <description>
    An object tag with a data URI did not correctly inherit the document's Content Security Policy. This allowed a CSP bypass in a cross-origin frame if the document's policy explicitly allowed data: URIs. This vulnerability affects Firefox &lt; 70.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17000/">CVE-2019-17000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17001" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17001" ref_url="https://www.suse.com/security/cve/CVE-2019-17001" source="SUSE CVE"/>
    <description>
    A Content-Security-Policy that blocks in-line scripts could be bypassed using an object tag to execute JavaScript in the protected document (cross-site scripting). This is a separate bypass from CVE-2019-17000.*Note: This flaw only affected Firefox 69 and was not present in earlier versions.*. This vulnerability affects Firefox &lt; 70.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17001/">CVE-2019-17001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17002" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17002" ref_url="https://www.suse.com/security/cve/CVE-2019-17002" source="SUSE CVE"/>
    <description>
    If upgrade-insecure-requests was specified in the Content Security Policy, and a link was dragged and dropped from that page, the link was not upgraded to https. This vulnerability affects Firefox &lt; 70.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17002/">CVE-2019-17002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    The plain text serializer used a fixed-size array for the number of &lt;ol&gt; elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00047.html" source="SUSE-SU"/>
    <description>
    In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17009" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17013" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17013" ref_url="https://www.suse.com/security/cve/CVE-2019-17013" source="SUSE CVE"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 70. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17013/">CVE-2019-17013</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17014" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17014" ref_url="https://www.suse.com/security/cve/CVE-2019-17014" source="SUSE CVE"/>
    <description>
    If an image had not loaded correctly (such as when it is not actually an image), it could be dragged and dropped cross-domain, resulting in a cross-origin information leak. This vulnerability affects Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17014/">CVE-2019-17014</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17015" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    When pasting a &amp;lt;style&amp;gt; tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17021" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    When pasting a &amp;lt;style&amp;gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape &amp;lt; and &amp;gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 68.4.1, Thunderbird &lt; 68.4.1, and Firefox &lt; 72.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17040" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17040" ref_url="https://www.suse.com/security/cve/CVE-2019-17040" source="SUSE CVE"/>
    <description>
    contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17040/">CVE-2019-17040</cve>
	<bugzilla href="https://bugzilla.suse.com/1152599">SUSE bug 1152599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17041" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041</cve>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198831">SUSE bug 1198831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562585" comment="rsyslog-8.24.0-3.33.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17042" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042</cve>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198831">SUSE bug 1198831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562585" comment="rsyslog-8.24.0-3.33.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17052" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17052" ref_url="https://www.suse.com/security/cve/CVE-2019-17052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel 3.16 through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17052/">CVE-2019-17052</cve>
	<bugzilla href="https://bugzilla.suse.com/1152779">SUSE bug 1152779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053</cve>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17054" ref_url="https://www.suse.com/security/cve/CVE-2019-17054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17054/">CVE-2019-17054</cve>
	<bugzilla href="https://bugzilla.suse.com/1152786">SUSE bug 1152786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17064" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17064" ref_url="https://www.suse.com/security/cve/CVE-2019-17064" source="SUSE CVE"/>
    <description>
    Catalog.cc in Xpdf 4.02 has a NULL pointer dereference because Catalog.pageLabels is initialized too late in the Catalog constructor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17064/">CVE-2019-17064</cve>
	<bugzilla href="https://bugzilla.suse.com/1152783">SUSE bug 1152783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17177" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17177" ref_url="https://www.suse.com/security/cve/CVE-2019-17177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" source="SUSE-SU"/>
    <description>
    libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17177/">CVE-2019-17177</cve>
	<bugzilla href="https://bugzilla.suse.com/1153163">SUSE bug 1153163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522402" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522403" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17178" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17178" ref_url="https://www.suse.com/security/cve/CVE-2019-17178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" source="SUSE-SU"/>
    <description>
    HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17178/">CVE-2019-17178</cve>
	<bugzilla href="https://bugzilla.suse.com/1153164">SUSE bug 1153164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522402" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522403" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17266" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17266" ref_url="https://www.suse.com/security/cve/CVE-2019-17266" source="SUSE CVE"/>
    <description>
    libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17266/">CVE-2019-17266</cve>
	<bugzilla href="https://bugzilla.suse.com/1153224">SUSE bug 1153224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334303" comment="libsoup is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17340" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17341" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17342" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17343" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17344" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17345" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17345" ref_url="https://www.suse.com/security/cve/CVE-2019-17345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17345/">CVE-2019-17345</cve>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17346" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346</cve>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17347" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347</cve>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348</cve>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17349" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17349" ref_url="https://www.suse.com/security/cve/CVE-2019-17349" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17349/">CVE-2019-17349</cve>
	<bugzilla href="https://bugzilla.suse.com/1138294">SUSE bug 1138294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17350" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17350" ref_url="https://www.suse.com/security/cve/CVE-2019-17350" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a compare-and-exchange operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17350/">CVE-2019-17350</cve>
	<bugzilla href="https://bugzilla.suse.com/1138294">SUSE bug 1138294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17362" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17362" ref_url="https://www.suse.com/security/cve/CVE-2019-17362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006200.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2454-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00041.html" source="SUSE-SU"/>
    <description>
    In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17362/">CVE-2019-17362</cve>
	<bugzilla href="https://bugzilla.suse.com/1153433">SUSE bug 1153433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522420" comment="libtomcrypt0-1.17-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17371" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17371" ref_url="https://www.suse.com/security/cve/CVE-2019-17371" source="SUSE CVE"/>
    <description>
    gif2png 2.5.13 has a memory leak in the writefile function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17371/">CVE-2019-17371</cve>
	<bugzilla href="https://bugzilla.suse.com/1153552">SUSE bug 1153552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333964" comment="libpng12 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334101" comment="libpng15 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334102" comment="libpng16 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17514" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17514" ref_url="https://www.suse.com/security/cve/CVE-2019-17514" source="SUSE CVE"/>
    <description>
    library/glob.html in the Python 2 and 3 documentation before 2016 has potentially misleading information about whether sorting occurs, as demonstrated by irreproducible cancer-research results. NOTE: the effects of this documentation cross application domains, and thus it is likely that security-relevant code elsewhere is affected. This issue is not a Python implementation bug, and there are no reports that NMR researchers were specifically relying on library/glob.html. In other words, because the older documentation stated "finds all the pathnames matching a specified pattern according to the rules used by the Unix shell," one might have incorrectly inferred that the sorting that occurs in a Unix shell also occurred for glob.glob. There is a workaround in newer versions of Willoughby nmr-data_compilation-p2.py and nmr-data_compilation-p3.py, which call sort() directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17514/">CVE-2019-17514</cve>
	<bugzilla href="https://bugzilla.suse.com/1154297">SUSE bug 1154297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17541" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17541" ref_url="https://www.suse.com/security/cve/CVE-2019-17541" source="SUSE CVE"/>
    <description>
    ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-01-08"/>
	<updated date="2022-01-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17541/">CVE-2019-17541</cve>
	<bugzilla href="https://bugzilla.suse.com/1153867">SUSE bug 1153867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17544" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17544" ref_url="https://www.suse.com/security/cve/CVE-2019-17544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006160.html" source="SUSE-SU"/>
    <description>
    libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17544/">CVE-2019-17544</cve>
	<bugzilla href="https://bugzilla.suse.com/1153892">SUSE bug 1153892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522387" comment="aspell-0.60.6.1-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522388" comment="libaspell15-0.60.6.1-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522389" comment="libaspell15-32bit-0.60.6.1-18.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17547" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17547" ref_url="https://www.suse.com/security/cve/CVE-2019-17547" source="SUSE CVE"/>
    <description>
    In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-01-08"/>
	<updated date="2022-01-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17547/">CVE-2019-17547</cve>
	<bugzilla href="https://bugzilla.suse.com/1153868">SUSE bug 1153868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594</cve>
	<bugzilla href="https://bugzilla.suse.com/1154036">SUSE bug 1154036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522411" comment="libncurses5-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522412" comment="libncurses5-32bit-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522413" comment="libncurses6-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522414" comment="libncurses6-32bit-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522415" comment="ncurses-devel-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522416" comment="ncurses-utils-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522417" comment="tack-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522418" comment="terminfo-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522419" comment="terminfo-base-5.9-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522411" comment="libncurses5-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522412" comment="libncurses5-32bit-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522413" comment="libncurses6-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522414" comment="libncurses6-32bit-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522415" comment="ncurses-devel-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522416" comment="ncurses-utils-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522417" comment="tack-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522418" comment="terminfo-5.9-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522419" comment="terminfo-base-5.9-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17624" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17624" ref_url="https://www.suse.com/security/cve/CVE-2019-17624" source="SUSE CVE"/>
    <description>
    "" In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap. For example, by sending ct.c_char 1000 times, an attacker can cause a denial of service (application crash) or possibly have unspecified other impact. Note: It is disputed if the X.Org X Server is involved or if there is a stack overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-17624/">CVE-2019-17624</cve>
	<bugzilla href="https://bugzilla.suse.com/1154325">SUSE bug 1154325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334344" comment="libX11 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1785" ref_url="https://www.suse.com/security/cve/CVE-2019-1785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1785/">CVE-2019-1785</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137508">SUSE bug 1137508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334331" comment="clamav is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1786" ref_url="https://www.suse.com/security/cve/CVE-2019-1786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1786/">CVE-2019-1786</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137510">SUSE bug 1137510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334331" comment="clamav is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Object Linking &amp; Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1798" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1798" ref_url="https://www.suse.com/security/cve/CVE-2019-1798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1798/">CVE-2019-1798</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137513">SUSE bug 1137513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334331" comment="clamav is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18198" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198</cve>
	<bugzilla href="https://bugzilla.suse.com/1154617">SUSE bug 1154617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18281" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18281" ref_url="https://www.suse.com/security/cve/CVE-2019-18281" source="SUSE CVE"/>
    <description>
    An out-of-bounds memory access in the generateDirectionalRuns() function in qtextengine.cpp in Qt qtbase 5.11.x and 5.12.x before 5.12.5 allows attackers to cause a denial of service by crashing an application via a text file containing many directional characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18281/">CVE-2019-18281</cve>
	<bugzilla href="https://bugzilla.suse.com/1155020">SUSE bug 1155020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334189" comment="libqt5-qtbase is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18282" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18282" ref_url="https://www.suse.com/security/cve/CVE-2019-18282" source="SUSE CVE"/>
    <description>
    The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18282/">CVE-2019-18282</cve>
	<bugzilla href="https://bugzilla.suse.com/1161121">SUSE bug 1161121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18388" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18389" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18390" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18391" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18392" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18392" ref_url="https://www.suse.com/security/cve/CVE-2019-18392" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-18392/">CVE-2019-18392</cve>
	<bugzilla href="https://bugzilla.suse.com/1159454">SUSE bug 1159454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339079" comment="virglrenderer is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008796.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0763-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPZ3M35XR5IQLIBDLZFFWGW6Z6SM7YNW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NAPU2NE5KWWCW4NS2FW7DLCSMM442VDM/" source="SUSE-SU"/>
    <description>
    A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397</cve>
	<bugzilla href="https://bugzilla.suse.com/1156260">SUSE bug 1156260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339082" comment="fribidi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18408" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408</cve>
	<bugzilla href="https://bugzilla.suse.com/1155079">SUSE bug 1155079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522371" comment="xen-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522372" comment="xen-libs-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522373" comment="xen-libs-32bit-4.11.2_04-2.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18421" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be "promoted" before being used as a pagetable, and "demoted" before being used for any other type. Xen also allows for "recursive" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522371" comment="xen-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522372" comment="xen-libs-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522373" comment="xen-libs-32bit-4.11.2_04-2.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18422" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service or gain privileges by leveraging the erroneous enabling of interrupts. Interrupts are unconditionally unmasked in exception handlers. When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enabled during exception entry. So exceptions which occur when interrupts are masked will effectively unmask the interrupts. A malicious guest might contrive to arrange for critical Xen code to run with interrupts erroneously enabled. This could lead to data corruption, denial of service, or possibly even privilege escalation. However a precise attack technique has not been identified.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422</cve>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18423" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service via a XENMEM_add_to_physmap hypercall. p2m-&gt;max_mapped_gfn is used by the functions p2m_resolve_translation_fault() and p2m_get_entry() to sanity check guest physical frame. The rest of the code in the two functions will assume that there is a valid root table and check that with BUG_ON(). The function p2m_get_root_pointer() will ignore the unused top bits of a guest physical frame. This means that the function p2m_set_entry() will alias the frame. However, p2m-&gt;max_mapped_gfn will be updated using the original frame. It would be possible to set p2m-&gt;max_mapped_gfn high enough to cover a frame that would lead p2m_get_root_pointer() to return NULL in p2m_get_entry() and p2m_resolve_translation_fault(). Additionally, the sanity check on p2m-&gt;max_mapped_gfn is off-by-one allowing "highest mapped + 1" to be considered valid. However, p2m_get_root_pointer() will return NULL. The problem could be triggered with a specially crafted hypercall XENMEM_add_to_physmap{, _batch} followed by an access to an address (via hypercall or direct access) that passes the sanity check but cause p2m_get_root_pointer() to return NULL. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen version 4.8 and newer are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423</cve>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18424" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18425" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don't install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522371" comment="xen-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522372" comment="xen-libs-4.11.2_04-2.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522373" comment="xen-libs-32bit-4.11.2_04-2.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18604" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18604" ref_url="https://www.suse.com/security/cve/CVE-2019-18604" source="SUSE CVE"/>
    <description>
    In axohelp.c before 1.3 in axohelp in axodraw2 before 2.1.1b, as distributed in TeXLive and other collections, sprintf is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-18604/">CVE-2019-18604</cve>
	<bugzilla href="https://bugzilla.suse.com/1155411">SUSE bug 1155411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334271" comment="texlive is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006492.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-02/msg00091.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522640" comment="sudo-1.8.20p2-3.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
    <description>
    The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675</cve>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680</cve>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173868">SUSE bug 1173868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18684" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18684" ref_url="https://www.suse.com/security/cve/CVE-2019-18684" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** Sudo through 1.8.29 allows local users to escalate to root if they have write access to file descriptor 3 of the sudo process. This occurs because of a race condition between determining a uid, and the setresuid and openat system calls. The attacker can write "ALL ALL=(ALL) NOPASSWD:ALL" to /proc/#####/fd/3 at a time when Sudo is prompting for a password. NOTE: This has been disputed due to the way Linux /proc works. It has been argued that writing to /proc/#####/fd/3 would only be viable if you had permission to write to /etc/sudoers. Even with write permission to /proc/#####/fd/3, it would not help you write to /etc/sudoers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-18684/">CVE-2019-18684</cve>
	<bugzilla href="https://bugzilla.suse.com/1155886">SUSE bug 1155886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.3.8, f-&gt;fmt.sdr.reserved is uninitialized in rcar_drif_g_fmt_sdr_cap in drivers/media/platform/rcar_drif.c, which could cause a memory disclosure problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786</cve>
	<bugzilla href="https://bugzilla.suse.com/1156043">SUSE bug 1156043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18807" ref_url="https://www.suse.com/security/cve/CVE-2019-18807" source="SUSE CVE"/>
    <description>
    Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18807/">CVE-2019-18807</cve>
	<bugzilla href="https://bugzilla.suse.com/1160881">SUSE bug 1160881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<bugzilla href="https://bugzilla.suse.com/1156259">SUSE bug 1156259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18809" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<bugzilla href="https://bugzilla.suse.com/1156258">SUSE bug 1156258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18810" ref_url="https://www.suse.com/security/cve/CVE-2019-18810" source="SUSE CVE"/>
    <description>
    A memory leak in the komeda_wb_connector_add() function in drivers/gpu/drm/arm/display/komeda/komeda_wb_connector.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering drm_writeback_connector_init() failures, aka CID-a0ecd6fdbf5d.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18810/">CVE-2019-18810</cve>
	<bugzilla href="https://bugzilla.suse.com/1156257">SUSE bug 1156257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811" source="SUSE CVE"/>
    <description>
    A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811</cve>
	<bugzilla href="https://bugzilla.suse.com/1159374">SUSE bug 1159374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812" source="SUSE CVE"/>
    <description>
    A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812</cve>
	<bugzilla href="https://bugzilla.suse.com/1156277">SUSE bug 1156277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813" source="SUSE CVE"/>
    <description>
    A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813</cve>
	<bugzilla href="https://bugzilla.suse.com/1156278">SUSE bug 1156278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18853" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18853" ref_url="https://www.suse.com/security/cve/CVE-2019-18853" source="SUSE CVE"/>
    <description>
    ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18853/">CVE-2019-18853</cve>
	<bugzilla href="https://bugzilla.suse.com/1156520">SUSE bug 1156520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18898" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18898" ref_url="https://www.suse.com/security/cve/CVE-2019-18898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00066.html" source="SUSE-SU"/>
    <description>
    UNIX Symbolic Link (Symlink) Following vulnerability in the trousers package of SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allowed local attackers escalate privileges from user tss to root. This issue affects: SUSE Linux Enterprise Server 15 SP1 trousers versions prior to 0.3.14-6.3.1. openSUSE Factory trousers versions prior to 0.3.14-7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18898/">CVE-2019-18898</cve>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157651">SUSE bug 1157651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334161" comment="trousers is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html" source="SUSE-SU"/>
    <description>
    : Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522674" comment="libzypp-16.21.2-2.45.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18902" ref_url="https://www.suse.com/security/cve/CVE-2019-18902" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00005.html" source="SUSE-SU"/>
    <description>
    A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-3.5.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-3.21.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.6.1. openSUSE Factory wicked versions prior to 0.6.62.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18902/">CVE-2019-18902</cve>
	<bugzilla href="https://bugzilla.suse.com/1160903">SUSE bug 1160903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522632" comment="wicked-0.6.60-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522633" comment="wicked-service-0.6.60-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18903" ref_url="https://www.suse.com/security/cve/CVE-2019-18903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00011.html" source="SUSE-SU"/>
    <description>
    A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-2.18.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-28.26.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.9.1. openSUSE Factory wicked versions prior to 0.6.62.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18903/">CVE-2019-18903</cve>
	<bugzilla href="https://bugzilla.suse.com/1160904">SUSE bug 1160904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522632" comment="wicked-0.6.60-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522633" comment="wicked-service-0.6.60-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19037" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037" source="SUSE CVE"/>
    <description>
    ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037</cve>
	<bugzilla href="https://bugzilla.suse.com/1157717">SUSE bug 1157717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19039" ref_url="https://www.suse.com/security/cve/CVE-2019-19039" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.”
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19039/">CVE-2019-19039</cve>
	<bugzilla href="https://bugzilla.suse.com/1157719">SUSE bug 1157719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19043" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043" source="SUSE CVE"/>
    <description>
    A memory leak in the i40e_setup_macvlans() function in drivers/net/ethernet/intel/i40e/i40e_main.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering i40e_setup_channel() failures, aka CID-27d461333459.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043</cve>
	<bugzilla href="https://bugzilla.suse.com/1159375">SUSE bug 1159375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19044" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044" source="SUSE CVE"/>
    <description>
    Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044</cve>
	<bugzilla href="https://bugzilla.suse.com/1159370">SUSE bug 1159370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<bugzilla href="https://bugzilla.suse.com/1157304">SUSE bug 1157304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19047" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047" source="SUSE CVE"/>
    <description>
    A memory leak in the mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_crdump_collect() failures, aka CID-c7ed6d0183d5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047</cve>
	<bugzilla href="https://bugzilla.suse.com/1157715">SUSE bug 1157715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19048" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048" source="SUSE CVE"/>
    <description>
    A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048</cve>
	<bugzilla href="https://bugzilla.suse.com/1157720">SUSE bug 1157720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19049" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<bugzilla href="https://bugzilla.suse.com/1157173">SUSE bug 1157173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19050" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050" source="SUSE CVE"/>
    <description>
    A memory leak in the crypto_reportstat() function in crypto/crypto_user_stat.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_reportstat_alg() failures, aka CID-c03b04dcdba1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050</cve>
	<bugzilla href="https://bugzilla.suse.com/1157336">SUSE bug 1157336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19051" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<bugzilla href="https://bugzilla.suse.com/1159024">SUSE bug 1159024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19052" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19053" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053" source="SUSE CVE"/>
    <description>
    A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053</cve>
	<bugzilla href="https://bugzilla.suse.com/1161520">SUSE bug 1161520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055</cve>
	<bugzilla href="https://bugzilla.suse.com/1157319">SUSE bug 1157319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<bugzilla href="https://bugzilla.suse.com/1157193">SUSE bug 1157193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<bugzilla href="https://bugzilla.suse.com/1157145">SUSE bug 1157145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19059" ref_url="https://www.suse.com/security/cve/CVE-2019-19059" source="SUSE CVE"/>
    <description>
    Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering iwl_pcie_init_fw_sec() or dma_alloc_coherent() failures, aka CID-0f4f199443fa.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19059/">CVE-2019-19059</cve>
	<bugzilla href="https://bugzilla.suse.com/1157296">SUSE bug 1157296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<bugzilla href="https://bugzilla.suse.com/1157178">SUSE bug 1157178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19061" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061" source="SUSE CVE"/>
    <description>
    A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061</cve>
	<bugzilla href="https://bugzilla.suse.com/1157192">SUSE bug 1157192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19064" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control these failures at probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064</cve>
	<bugzilla href="https://bugzilla.suse.com/1157300">SUSE bug 1157300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because "rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem)."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173961">SUSE bug 1173961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<bugzilla href="https://bugzilla.suse.com/1157180">SUSE bug 1157180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<bugzilla href="https://bugzilla.suse.com/1157307">SUSE bug 1157307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19069" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069" source="SUSE CVE"/>
    <description>
    A memory leak in the fastrpc_dma_buf_attach() function in drivers/misc/fastrpc.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering dma_get_sgtable() failures, aka CID-fc739a058d99.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069</cve>
	<bugzilla href="https://bugzilla.suse.com/1157064">SUSE bug 1157064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19070" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070</cve>
	<bugzilla href="https://bugzilla.suse.com/1157294">SUSE bug 1157294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19071" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071" source="SUSE CVE"/>
    <description>
    A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<bugzilla href="https://bugzilla.suse.com/1157067">SUSE bug 1157067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19072" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072" source="SUSE CVE"/>
    <description>
    A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072</cve>
	<bugzilla href="https://bugzilla.suse.com/1157069">SUSE bug 1157069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<bugzilla href="https://bugzilla.suse.com/1157162">SUSE bug 1157162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173958">SUSE bug 1173958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19076" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19076" ref_url="https://www.suse.com/security/cve/CVE-2019-19076" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19076/">CVE-2019-19076</cve>
	<bugzilla href="https://bugzilla.suse.com/1157164">SUSE bug 1157164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<bugzilla href="https://bugzilla.suse.com/1157171">SUSE bug 1157171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19078" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<bugzilla href="https://bugzilla.suse.com/1157032">SUSE bug 1157032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19079" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19079" ref_url="https://www.suse.com/security/cve/CVE-2019-19079" source="SUSE CVE"/>
    <description>
    A memory leak in the qrtr_tun_write_iter() function in net/qrtr/tun.c in the Linux kernel before 5.3 allows attackers to cause a denial of service (memory consumption), aka CID-a21b7f0cff19.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19079/">CVE-2019-19079</cve>
	<bugzilla href="https://bugzilla.suse.com/1157039">SUSE bug 1157039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<bugzilla href="https://bugzilla.suse.com/1157044">SUSE bug 1157044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<bugzilla href="https://bugzilla.suse.com/1157045">SUSE bug 1157045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<bugzilla href="https://bugzilla.suse.com/1157046">SUSE bug 1157046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<bugzilla href="https://bugzilla.suse.com/1157049">SUSE bug 1157049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006413.html" source="SUSE-SU"/>
    <description>
    On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126</cve>
	<bugzilla href="https://bugzilla.suse.com/1157292">SUSE bug 1157292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19227" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227</cve>
	<bugzilla href="https://bugzilla.suse.com/1157678">SUSE bug 1157678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19232" ref_url="https://www.suse.com/security/cve/CVE-2019-19232" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19232/">CVE-2019-19232</cve>
	<bugzilla href="https://bugzilla.suse.com/1159618">SUSE bug 1159618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19234" ref_url="https://www.suse.com/security/cve/CVE-2019-19234" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to impersonate any blocked user. NOTE: The software maintainer believes that this CVE is not valid. Disabling local password authentication for a user is not the same as disabling all access to that user--the user may still be able to login via other means (ssh key, kerberos, etc). Both the Linux shadow(5) and passwd(1) manuals are clear on this. Indeed it is a valid use case to have local accounts that are _only_ accessible via sudo and that cannot be logged into with a password. Sudo 1.8.30 added an optional setting to check the _shell_ of the target user (not the encrypted password!) against the contents of /etc/shells but that is not the same thing as preventing access to users with an invalid password hash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19234/">CVE-2019-19234</cve>
	<bugzilla href="https://bugzilla.suse.com/1159616">SUSE bug 1159616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19241" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.4.2, the io_uring feature leads to requests that inadvertently have UID 0 and full capabilities, aka CID-181e448d8709. This is related to fs/io-wq.c, fs/io_uring.c, and net/socket.c. For example, an attacker can bypass intended restrictions on adding an IPv4 address to the loopback interface. This occurs because IORING_OP_SENDMSG operations, although requested in the context of an unprivileged user, are sometimes performed by a kernel worker thread without considering that context.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241</cve>
	<bugzilla href="https://bugzilla.suse.com/1159441">SUSE bug 1159441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19242" ref_url="https://www.suse.com/security/cve/CVE-2019-19242" source="SUSE CVE"/>
    <description>
    SQLite 3.30.1 mishandles pExpr-&gt;y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19242/">CVE-2019-19242</cve>
	<bugzilla href="https://bugzilla.suse.com/1157817">SUSE bug 1157817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244</cve>
	<bugzilla href="https://bugzilla.suse.com/1157817">SUSE bug 1157817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19252" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252" source="SUSE CVE"/>
    <description>
    vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<bugzilla href="https://bugzilla.suse.com/1157813">SUSE bug 1157813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19337" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19337" ref_url="https://www.suse.com/security/cve/CVE-2019-19337" source="SUSE CVE"/>
    <description>
    A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19337/">CVE-2019-19337</cve>
	<bugzilla href="https://bugzilla.suse.com/1159617">SUSE bug 1159617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19344" ref_url="https://www.suse.com/security/cve/CVE-2019-19344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19344/">CVE-2019-19344</cve>
	<bugzilla href="https://bugzilla.suse.com/1160852">SUSE bug 1160852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19378" ref_url="https://www.suse.com/security/cve/CVE-2019-19378" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19378/">CVE-2019-19378</cve>
	<bugzilla href="https://bugzilla.suse.com/1158270">SUSE bug 1158270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185853">SUSE bug 1185853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19449" ref_url="https://www.suse.com/security/cve/CVE-2019-19449" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19449/">CVE-2019-19449</cve>
	<bugzilla href="https://bugzilla.suse.com/1158821">SUSE bug 1158821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19451" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19451" ref_url="https://www.suse.com/security/cve/CVE-2019-19451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3391-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193391-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00019.html" source="SUSE-SU"/>
    <description>
    When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19451/">CVE-2019-19451</cve>
	<bugzilla href="https://bugzilla.suse.com/1158194">SUSE bug 1158194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522453" comment="dia-0.97.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522454" comment="dia-lang-0.97.3-17.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19480" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19480" ref_url="https://www.suse.com/security/cve/CVE-2019-19480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-19480/">CVE-2019-19480</cve>
	<bugzilla href="https://bugzilla.suse.com/1158307">SUSE bug 1158307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334110" comment="opensc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19481" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19481" ref_url="https://www.suse.com/security/cve/CVE-2019-19481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-cac1.c mishandles buffer limits for CAC certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19481/">CVE-2019-19481</cve>
	<bugzilla href="https://bugzilla.suse.com/1158305">SUSE bug 1158305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334110" comment="opensc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158407">SUSE bug 1158407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19553" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19553" ref_url="https://www.suse.com/security/cve/CVE-2019-19553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19553/">CVE-2019-19553</cve>
	<bugzilla href="https://bugzilla.suse.com/1158505">SUSE bug 1158505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19577" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given direct access to physical devices are vulnerable. Systems which do not use PCI pass-through are not vulnerable. Only HVM guests can exploit the vulnerability. PV and PVH guests cannot. All versions of Xen with IOMMU support are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19578" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at itself, or to another pagetable of the same or higher level. Xen has limited support for linear pagetables: A page may either point to itself, or point to another pagetable of the same level (i.e., L2 to L2, L3 to L3, and so on). XSA-240 introduced an additional restriction that limited the "depth" of such chains by allowing pages to either *point to* other pages of the same level, or *be pointed to* by other pages of the same level, but not both. To implement this, we keep track of the number of outstanding times a page points to or is pointed to another page table, to prevent both from happening at the same time. Unfortunately, the original commit introducing this reset this count when resuming validation of a partially-validated pagetable, incorrectly dropping some "linear_pt_entry" counts. If an attacker could engineer such a situation to occur, they might be able to make loops or other arbitrary chains of linear pagetables, as described in XSA-240. A malicious or buggy PV guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Privilege escalation and information leaks cannot be excluded. All versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Only systems which have enabled linear pagetables are vulnerable. Systems which have disabled linear pagetables, either by selecting CONFIG_PV_LINEAR_PT=n when building the hypervisor, or adding pv-linear-pt=false on the command-line, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19579" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl's "assignable-add" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these "alternate" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19580" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type change operations. Despite extensive testing and auditing, some corner cases were missed. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All security-supported versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Note that these attacks require very precise timing, which may be difficult to exploit in practice.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19581" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On 32-bit Arm accesses to bitmaps with bit a count which is a multiple of 32, an out of bounds access may occur. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. 32-bit Arm systems are vulnerable. 64-bit Arm systems are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581</cve>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19582" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On x86 accesses to bitmaps with a compile time known size of 64 may incur undefined behavior, which may in particular result in infinite loops. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. x86 systems with 64 or more nodes are vulnerable (there might not be any such systems that Xen would run on). x86 systems with less than 64 nodes are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582</cve>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19583" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645</cve>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19646" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646</cve>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19725" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00063.html" source="SUSE-SU"/>
    <description>
    sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725</cve>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522597" comment="sysstat-12.0.2-10.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338726" comment="transfig is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19797" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338726" comment="transfig is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for a different purpose after refactoring.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19814" ref_url="https://www.suse.com/security/cve/CVE-2019-19814" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19814/">CVE-2019-19814</cve>
	<bugzilla href="https://bugzilla.suse.com/1159437">SUSE bug 1159437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19815" ref_url="https://www.suse.com/security/cve/CVE-2019-19815" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause a NULL pointer dereference in f2fs_recover_fsync_data in fs/f2fs/recovery.c. This is related to F2FS_P_SB in fs/f2fs/f2fs.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19815/">CVE-2019-19815</cve>
	<bugzilla href="https://bugzilla.suse.com/1159438">SUSE bug 1159438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19882" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19882" ref_url="https://www.suse.com/security/cve/CVE-2019-19882" source="SUSE CVE"/>
    <description>
    shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19882/">CVE-2019-19882</cve>
	<bugzilla href="https://bugzilla.suse.com/1159633">SUSE bug 1159633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339088" comment="shadow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922" source="SUSE CVE"/>
    <description>
    kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922</cve>
	<bugzilla href="https://bugzilla.suse.com/1159717">SUSE bug 1159717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924</cve>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19927" ref_url="https://www.suse.com/security/cve/CVE-2019-19927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19927/">CVE-2019-19927</cve>
	<bugzilla href="https://bugzilla.suse.com/1160147">SUSE bug 1160147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19947" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947</cve>
	<bugzilla href="https://bugzilla.suse.com/1159929">SUSE bug 1159929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522641" comment="ImageMagick-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522642" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522643" comment="ImageMagick-config-6-upstream-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522644" comment="libMagick++-6_Q16-3-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522645" comment="libMagickCore-6_Q16-1-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522646" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522647" comment="libMagickWand-6_Q16-1-6.8.8.1-71.141.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522641" comment="ImageMagick-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522642" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522643" comment="ImageMagick-config-6-upstream-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522644" comment="libMagick++-6_Q16-3-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522645" comment="libMagickCore-6_Q16-1-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522646" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522647" comment="libMagickWand-6_Q16-1-6.8.8.1-71.141.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19951" ref_url="https://www.suse.com/security/cve/CVE-2019-19951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190423 Q8, there is a heap-based buffer overflow in the function ImportRLEPixels of coders/miff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19951/">CVE-2019-19951</cve>
	<bugzilla href="https://bugzilla.suse.com/1160321">SUSE bug 1160321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19952" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19952" ref_url="https://www.suse.com/security/cve/CVE-2019-19952" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.9-7 Q16, there is a use-after-free in the function MngInfoDiscardObject of coders/png.c, related to ReadOneMNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19952/">CVE-2019-19952</cve>
	<bugzilla href="https://bugzilla.suse.com/1160426">SUSE bug 1160426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19953" ref_url="https://www.suse.com/security/cve/CVE-2019-19953" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20191208 Q8, there is a heap-based buffer over-read in the function EncodeImage of coders/pict.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19953/">CVE-2019-19953</cve>
	<bugzilla href="https://bugzilla.suse.com/1160364">SUSE bug 1160364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959</cve>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20079" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20079" ref_url="https://www.suse.com/security/cve/CVE-2019-20079" source="SUSE CVE"/>
    <description>
    The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20079/">CVE-2019-20079</cve>
	<bugzilla href="https://bugzilla.suse.com/1173113">SUSE bug 1173113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334305" comment="vim is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20095" ref_url="https://www.suse.com/security/cve/CVE-2019-20095" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20095/">CVE-2019-20095</cve>
	<bugzilla href="https://bugzilla.suse.com/1159909">SUSE bug 1159909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159914">SUSE bug 1159914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20096" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521704" comment="kernel-default-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521705" comment="kernel-default-devel-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521706" comment="kernel-default-extra-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521707" comment="kernel-devel-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521708" comment="kernel-macros-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521709" comment="kernel-source-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521710" comment="kernel-syms-4.4.176-94.88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2054" ref_url="https://www.suse.com/security/cve/CVE-2019-2054" source="SUSE CVE"/>
    <description>
    In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2054/">CVE-2019-2054</cve>
	<bugzilla href="https://bugzilla.suse.com/1134561">SUSE bug 1134561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181039">SUSE bug 1181039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20808" ref_url="https://www.suse.com/security/cve/CVE-2019-20808" source="SUSE CVE"/>
    <description>
    In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20808/">CVE-2019-20808</cve>
	<bugzilla href="https://bugzilla.suse.com/1172379">SUSE bug 1172379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2126" ref_url="https://www.suse.com/security/cve/CVE-2019-2126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html" source="SUSE-SU"/>
    <description>
    In ParseContentEncodingEntry of mkvparser.cc, there is a possible double free due to a missing reset of a freed pointer. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-127702368.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2126/">CVE-2019-2126</cve>
	<bugzilla href="https://bugzilla.suse.com/1160611">SUSE bug 1160611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334008" comment="libvpx is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2182" ref_url="https://www.suse.com/security/cve/CVE-2019-2182" source="SUSE CVE"/>
    <description>
    In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2182/">CVE-2019-2182</cve>
	<bugzilla href="https://bugzilla.suse.com/1150022">SUSE bug 1150022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2971-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html" source="SUSE-SU"/>
    <description>
    In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2213" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2213" ref_url="https://www.suse.com/security/cve/CVE-2019-2213" source="SUSE CVE"/>
    <description>
    In binder_free_transaction of binder.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-133758011References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2213/">CVE-2019-2213</cve>
	<bugzilla href="https://bugzilla.suse.com/1156185">SUSE bug 1156185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2214" ref_url="https://www.suse.com/security/cve/CVE-2019-2214" source="SUSE CVE"/>
    <description>
    In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2214/">CVE-2019-2214</cve>
	<bugzilla href="https://bugzilla.suse.com/1156186">SUSE bug 1156186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2426" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2449" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334125" comment="java-1_7_0-openjdk is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2510" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510</cve>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522490" comment="mariadb-10.2.22-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522491" comment="mariadb-client-10.2.22-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499000" comment="mariadb-errormessages-10.2.22-3.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2529" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529</cve>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522081" comment="libmysqlclient18-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522082" comment="libmysqlclient18-32bit-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522083" comment="libmysqlclient_r18-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522084" comment="libmysqlclient_r18-32bit-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522085" comment="mariadb-100-errormessages-10.0.38-2.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2537" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522081" comment="libmysqlclient18-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522082" comment="libmysqlclient18-32bit-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522083" comment="libmysqlclient_r18-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522084" comment="libmysqlclient_r18-32bit-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522490" comment="mariadb-10.2.22-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522085" comment="mariadb-100-errormessages-10.0.38-2.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522491" comment="mariadb-client-10.2.22-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499000" comment="mariadb-errormessages-10.2.22-3.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522109" comment="libmariadb3-3.1.2-2.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522110" comment="libmariadb_plugins-3.1.2-2.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522253" comment="libmysqlclient18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522254" comment="libmysqlclient18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522255" comment="libmysqlclient_r18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522256" comment="libmysqlclient_r18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522111" comment="mariadb-10.2.25-3.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522257" comment="mariadb-100-errormessages-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522112" comment="mariadb-client-10.2.25-3.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522113" comment="mariadb-errormessages-10.2.25-3.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2627" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522109" comment="libmariadb3-3.1.2-2.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522110" comment="libmariadb_plugins-3.1.2-2.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522253" comment="libmysqlclient18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522254" comment="libmysqlclient18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522255" comment="libmysqlclient_r18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522256" comment="libmysqlclient_r18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522111" comment="mariadb-10.2.25-3.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522257" comment="mariadb-100-errormessages-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522112" comment="mariadb-client-10.2.25-3.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522113" comment="mariadb-errormessages-10.2.25-3.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628</cve>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522109" comment="libmariadb3-3.1.2-2.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522110" comment="libmariadb_plugins-3.1.2-2.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522111" comment="mariadb-10.2.25-3.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522112" comment="mariadb-client-10.2.25-3.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522113" comment="mariadb-errormessages-10.2.25-3.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184734">SUSE bug 1184734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2697" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-14"/>
	<updated date="2022-05-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334125" comment="java-1_7_0-openjdk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333949" comment="java-1_8_0-openjdk is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522253" comment="libmysqlclient18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522254" comment="libmysqlclient18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522255" comment="libmysqlclient_r18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522256" comment="libmysqlclient_r18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522435" comment="mariadb-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522257" comment="mariadb-100-errormessages-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522436" comment="mariadb-client-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522437" comment="mariadb-errormessages-10.2.29-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522253" comment="libmysqlclient18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522254" comment="libmysqlclient18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522255" comment="libmysqlclient_r18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522256" comment="libmysqlclient_r18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522435" comment="mariadb-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522257" comment="mariadb-100-errormessages-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522436" comment="mariadb-client-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522437" comment="mariadb-errormessages-10.2.29-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522253" comment="libmysqlclient18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522254" comment="libmysqlclient18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522255" comment="libmysqlclient_r18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522256" comment="libmysqlclient_r18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522435" comment="mariadb-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522257" comment="mariadb-100-errormessages-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522436" comment="mariadb-client-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522437" comment="mariadb-errormessages-10.2.29-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2758" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758</cve>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522435" comment="mariadb-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522436" comment="mariadb-client-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522437" comment="mariadb-errormessages-10.2.29-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522253" comment="libmysqlclient18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522254" comment="libmysqlclient18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522255" comment="libmysqlclient_r18-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522256" comment="libmysqlclient_r18-32bit-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522435" comment="mariadb-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522257" comment="mariadb-100-errormessages-10.0.40.1-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522436" comment="mariadb-client-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522437" comment="mariadb-errormessages-10.2.29-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2933" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2938" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938</cve>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522435" comment="mariadb-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522436" comment="mariadb-client-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522437" comment="mariadb-errormessages-10.2.29-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2958" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522438" comment="libmysqlclient18-10.0.40.2-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522439" comment="libmysqlclient18-32bit-10.0.40.2-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522440" comment="libmysqlclient_r18-10.0.40.2-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522441" comment="libmysqlclient_r18-32bit-10.0.40.2-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522435" comment="mariadb-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522442" comment="mariadb-100-errormessages-10.0.40.2-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522436" comment="mariadb-client-10.2.29-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522437" comment="mariadb-errormessages-10.2.29-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016" source="SUSE CVE"/>
    <description>
    In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016</cve>
	<bugzilla href="https://bugzilla.suse.com/1161154">SUSE bug 1161154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    The permission package in SUSE Linux Enterprise Server allowed all local users to run dumpcap in the "easy" permission profile and sniff network traffic. This issue affects: SUSE Linux Enterprise Server permissions versions starting from 85c83fef7e017f8ab7f8602d3163786d57344439 to 081d081dcfaf61710bda34bc21c80c66276119aa.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687</cve>
	<bugzilla href="https://bugzilla.suse.com/1148788">SUSE bug 1148788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180102">SUSE bug 1180102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334167" comment="permissions is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149108">SUSE bug 1149108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522422" comment="permissions-20170707-3.14.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2776-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192776-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html" source="SUSE-SU"/>
    <description>
    The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522280" comment="nfs-client-1.3.0-34.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522281" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html" source="SUSE-SU"/>
    <description>
    The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<bugzilla href="https://bugzilla.suse.com/1148336">SUSE bug 1148336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157880">SUSE bug 1157880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522422" comment="permissions-20170707-3.14.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0542-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190542-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0552-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190552-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0556-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190556-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00045.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811</cve>
	<bugzilla href="https://bugzilla.suse.com/1121759">SUSE bug 1121759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521715" comment="adcli-0.8.2-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521716" comment="libipa_hbac0-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521717" comment="libsss_idmap0-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521718" comment="libsss_nss_idmap0-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521719" comment="libsss_sudo-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521720" comment="python-sssd-config-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521721" comment="sssd-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521722" comment="sssd-32bit-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521723" comment="sssd-ad-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521724" comment="sssd-ipa-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521725" comment="sssd-krb5-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521726" comment="sssd-krb5-common-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521727" comment="sssd-ldap-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521728" comment="sssd-proxy-1.13.4-34.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521729" comment="sssd-tools-1.13.4-34.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522466" comment="libipa_hbac0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522467" comment="libsss_certmap0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522468" comment="libsss_idmap0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522469" comment="libsss_nss_idmap0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522470" comment="libsss_simpleifp0-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522471" comment="python-sssd-config-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522472" comment="sssd-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522473" comment="sssd-32bit-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522474" comment="sssd-ad-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522475" comment="sssd-ipa-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522476" comment="sssd-krb5-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522477" comment="sssd-krb5-common-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522478" comment="sssd-ldap-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522479" comment="sssd-proxy-1.16.1-4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522480" comment="sssd-tools-1.16.1-4.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3812" ref_url="https://www.suse.com/security/cve/CVE-2019-3812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
    <description>
    QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3812/">CVE-2019-3812</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125721">SUSE bug 1125721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521765" comment="qemu-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521766" comment="qemu-block-curl-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521767" comment="qemu-ipxe-1.0.0+-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521768" comment="qemu-kvm-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521769" comment="qemu-seabios-1.10.2-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521770" comment="qemu-sgabios-8-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521771" comment="qemu-tools-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521772" comment="qemu-vgabios-1.10.2-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521773" comment="qemu-x86-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0231-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521596" comment="libspice-server1-0.12.8-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334169" comment="spice-gtk is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3815" ref_url="https://www.suse.com/security/cve/CVE-2019-3815" source="SUSE CVE"/>
    <description>
    A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the `_CMDLINE=` entry. A local attacker may use this flaw to make systemd-journald crash. This issue only affects versions shipped with Red Hat Enterprise since v219-62.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3815/">CVE-2019-3815</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13981-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913981-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00065.html" source="SUSE-SU"/>
    <description>
    Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816</cve>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521687" comment="libwsman1-2.4.11-21.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521688" comment="libwsman_clientpp1-2.4.11-21.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521689" comment="openwsman-server-2.4.11-21.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html" source="SUSE-SU"/>
    <description>
    It was discovered that the gnome-shell lock screen since version 3.15.91 did not properly restrict all contextual actions. An attacker with physical access to a locked workstation could invoke certain keyboard shortcuts, and potentially other actions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820</cve>
	<bugzilla href="https://bugzilla.suse.com/1124493">SUSE bug 1124493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521226" comment="gnome-shell-3.20.4-77.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521227" comment="gnome-shell-browser-plugin-3.20.4-77.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521228" comment="gnome-shell-calendar-3.20.4-77.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521229" comment="gnome-shell-lang-3.20.4-77.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3821" ref_url="https://www.suse.com/security/cve/CVE-2019-3821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005774.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3821/">CVE-2019-3821</cve>
	<bugzilla href="https://bugzilla.suse.com/1125080">SUSE bug 1125080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00023.html" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522450" comment="curl-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522451" comment="libcurl4-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522452" comment="libcurl4-32bit-7.60.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00023.html" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522450" comment="curl-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522451" comment="libcurl4-7.60.0-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522452" comment="libcurl4-32bit-7.60.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3824" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0639-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190639-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824</cve>
	<bugzilla href="https://bugzilla.suse.com/1125410">SUSE bug 1125410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130703">SUSE bug 1130703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334172" comment="ldb is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3825" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3825" ref_url="https://www.suse.com/security/cve/CVE-2019-3825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3825/">CVE-2019-3825</cve>
	<bugzilla href="https://bugzilla.suse.com/1124628">SUSE bug 1124628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334029" comment="gdm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3829" ref_url="https://www.suse.com/security/cve/CVE-2019-3829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3829/">CVE-2019-3829</cve>
	<bugzilla href="https://bugzilla.suse.com/1130681">SUSE bug 1130681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3832" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3832" ref_url="https://www.suse.com/security/cve/CVE-2019-3832" source="SUSE CVE"/>
    <description>
    It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-3832/">CVE-2019-3832</cve>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125575">SUSE bug 1125575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334031" comment="libsndfile is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13981-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913981-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00065.html" source="SUSE-SU"/>
    <description>
    Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833</cve>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521687" comment="libwsman1-2.4.11-21.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521688" comment="libwsman_clientpp1-2.4.11-21.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521689" comment="openwsman-server-2.4.11-21.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3836" ref_url="https://www.suse.com/security/cve/CVE-2019-3836" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html" source="SUSE-SU"/>
    <description>
    It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3836/">CVE-2019-3836</cve>
	<bugzilla href="https://bugzilla.suse.com/1130682">SUSE bug 1130682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3837" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3837" ref_url="https://www.suse.com/security/cve/CVE-2019-3837" source="SUSE CVE"/>
    <description>
    It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3837/">CVE-2019-3837</cve>
	<bugzilla href="https://bugzilla.suse.com/1131430">SUSE bug 1131430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00018.html" source="SUSE-SU"/>
    <description>
    It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032135">SUSE bug 1032135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038835">SUSE bug 1038835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114495">SUSE bug 1114495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136756">SUSE bug 1136756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521696" comment="ghostscript-9.26a-23.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521697" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3839" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839</cve>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840</cve>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521090" comment="libvirt-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521091" comment="libvirt-admin-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521092" comment="libvirt-client-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521093" comment="libvirt-daemon-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521094" comment="libvirt-daemon-config-network-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521095" comment="libvirt-daemon-config-nwfilter-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521096" comment="libvirt-daemon-driver-interface-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521097" comment="libvirt-daemon-driver-libxl-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521098" comment="libvirt-daemon-driver-lxc-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521099" comment="libvirt-daemon-driver-network-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521100" comment="libvirt-daemon-driver-nodedev-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521101" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521102" comment="libvirt-daemon-driver-qemu-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521103" comment="libvirt-daemon-driver-secret-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521104" comment="libvirt-daemon-driver-storage-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521105" comment="libvirt-daemon-driver-storage-core-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521106" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521107" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521108" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521109" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521110" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521111" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521112" comment="libvirt-daemon-lxc-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521113" comment="libvirt-daemon-qemu-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521114" comment="libvirt-daemon-xen-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521115" comment="libvirt-doc-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521116" comment="libvirt-libs-3.3.0-5.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522505" comment="libvirt-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522506" comment="libvirt-admin-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522507" comment="libvirt-client-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522508" comment="libvirt-daemon-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522509" comment="libvirt-daemon-config-network-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522510" comment="libvirt-daemon-config-nwfilter-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522511" comment="libvirt-daemon-driver-interface-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522512" comment="libvirt-daemon-driver-libxl-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522513" comment="libvirt-daemon-driver-lxc-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522514" comment="libvirt-daemon-driver-network-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522515" comment="libvirt-daemon-driver-nodedev-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522516" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522517" comment="libvirt-daemon-driver-qemu-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522518" comment="libvirt-daemon-driver-secret-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522519" comment="libvirt-daemon-driver-storage-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522520" comment="libvirt-daemon-driver-storage-core-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522521" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522522" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522523" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522524" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522525" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522526" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522527" comment="libvirt-daemon-lxc-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522528" comment="libvirt-daemon-qemu-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522529" comment="libvirt-daemon-xen-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522530" comment="libvirt-doc-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522531" comment="libvirt-libs-4.0.0-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3843" ref_url="https://www.suse.com/security/cve/CVE-2019-3843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
    <description>
    It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3843/">CVE-2019-3843</cve>
	<bugzilla href="https://bugzilla.suse.com/1133506">SUSE bug 1133506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3844" ref_url="https://www.suse.com/security/cve/CVE-2019-3844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
    <description>
    It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3844/">CVE-2019-3844</cve>
	<bugzilla href="https://bugzilla.suse.com/1133509">SUSE bug 1133509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134329">SUSE bug 1134329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521117" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521118" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3870" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3870" ref_url="https://www.suse.com/security/cve/CVE-2019-3870" source="SUSE CVE"/>
    <description>
    A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3870/">CVE-2019-3870</cve>
	<bugzilla href="https://bugzilla.suse.com/1130703">SUSE bug 1130703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005435.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139519">SUSE bug 1139519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521040" comment="libdcerpc-binding0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521041" comment="libdcerpc-binding0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521042" comment="libdcerpc0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521043" comment="libdcerpc0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521044" comment="libndr-krb5pac0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521045" comment="libndr-krb5pac0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521046" comment="libndr-nbt0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521047" comment="libndr-nbt0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521048" comment="libndr-standard0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521049" comment="libndr-standard0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521050" comment="libndr0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521051" comment="libndr0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521052" comment="libnetapi0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521053" comment="libnetapi0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521054" comment="libsamba-credentials0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521055" comment="libsamba-credentials0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521056" comment="libsamba-errors0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521057" comment="libsamba-errors0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521058" comment="libsamba-hostconfig0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521059" comment="libsamba-hostconfig0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521060" comment="libsamba-passdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521061" comment="libsamba-passdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521062" comment="libsamba-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521063" comment="libsamba-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521064" comment="libsamdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521065" comment="libsamdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521066" comment="libsmbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521067" comment="libsmbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521068" comment="libsmbconf0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521069" comment="libsmbconf0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521070" comment="libsmbldap0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521071" comment="libsmbldap0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521072" comment="libtevent-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521073" comment="libtevent-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521074" comment="libwbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521075" comment="libwbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521076" comment="samba-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521077" comment="samba-client-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521078" comment="samba-client-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521079" comment="samba-doc-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521080" comment="samba-libs-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521081" comment="samba-libs-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521082" comment="samba-winbind-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521083" comment="samba-winbind-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html" source="SUSE-SU"/>
    <description>
    An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133150">SUSE bug 1133150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521090" comment="libvirt-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521091" comment="libvirt-admin-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521092" comment="libvirt-client-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521093" comment="libvirt-daemon-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521094" comment="libvirt-daemon-config-network-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521095" comment="libvirt-daemon-config-nwfilter-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521096" comment="libvirt-daemon-driver-interface-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521097" comment="libvirt-daemon-driver-libxl-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521098" comment="libvirt-daemon-driver-lxc-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521099" comment="libvirt-daemon-driver-network-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521100" comment="libvirt-daemon-driver-nodedev-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521101" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521102" comment="libvirt-daemon-driver-qemu-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521103" comment="libvirt-daemon-driver-secret-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521104" comment="libvirt-daemon-driver-storage-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521105" comment="libvirt-daemon-driver-storage-core-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521106" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521107" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521108" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521109" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521110" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521111" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521112" comment="libvirt-daemon-lxc-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521113" comment="libvirt-daemon-qemu-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521114" comment="libvirt-daemon-xen-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521115" comment="libvirt-doc-3.3.0-5.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521116" comment="libvirt-libs-3.3.0-5.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522505" comment="libvirt-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522506" comment="libvirt-admin-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522507" comment="libvirt-client-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522508" comment="libvirt-daemon-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522509" comment="libvirt-daemon-config-network-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522510" comment="libvirt-daemon-config-nwfilter-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522511" comment="libvirt-daemon-driver-interface-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522512" comment="libvirt-daemon-driver-libxl-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522513" comment="libvirt-daemon-driver-lxc-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522514" comment="libvirt-daemon-driver-network-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522515" comment="libvirt-daemon-driver-nodedev-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522516" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522517" comment="libvirt-daemon-driver-qemu-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522518" comment="libvirt-daemon-driver-secret-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522519" comment="libvirt-daemon-driver-storage-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522520" comment="libvirt-daemon-driver-storage-core-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522521" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522522" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522523" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522524" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522525" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522526" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522527" comment="libvirt-daemon-lxc-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522528" comment="libvirt-daemon-qemu-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522529" comment="libvirt-daemon-xen-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522530" comment="libvirt-doc-4.0.0-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522531" comment="libvirt-libs-4.0.0-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3887" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3887" ref_url="https://www.suse.com/security/cve/CVE-2019-3887" source="SUSE CVE"/>
    <description>
    A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3887/">CVE-2019-3887</cve>
	<bugzilla href="https://bugzilla.suse.com/1131800">SUSE bug 1131800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3892" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3892" ref_url="https://www.suse.com/security/cve/CVE-2019-3892" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-11599. Reason: This candidate is a reservation duplicate of CVE-2019-11599. Notes: All CVE users should reference CVE-2019-11599 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3892/">CVE-2019-3892</cve>
	<bugzilla href="https://bugzilla.suse.com/1131645">SUSE bug 1131645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3896" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3896" ref_url="https://www.suse.com/security/cve/CVE-2019-3896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
    <description>
    A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3896/">CVE-2019-3896</cve>
	<bugzilla href="https://bugzilla.suse.com/1138943">SUSE bug 1138943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173987">SUSE bug 1173987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3901" ref_url="https://www.suse.com/security/cve/CVE-2019-3901" source="SUSE CVE"/>
    <description>
    A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3901/">CVE-2019-3901</cve>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133106">SUSE bug 1133106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
    <description>
    hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008</cve>
	<bugzilla href="https://bugzilla.suse.com/1133031">SUSE bug 1133031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521639" comment="python-devel-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5018" ref_url="https://www.suse.com/security/cve/CVE-2019-5018" source="SUSE CVE"/>
    <description>
    An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5018/">CVE-2019-5018</cve>
	<bugzilla href="https://bugzilla.suse.com/1134622">SUSE bug 1134622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0111-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html" source="SUSE-SU"/>
    <description>
    An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522535" comment="Mesa-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522536" comment="Mesa-32bit-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522537" comment="Mesa-dri-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522538" comment="Mesa-dri-32bit-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522539" comment="Mesa-libEGL1-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522540" comment="Mesa-libEGL1-32bit-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522541" comment="Mesa-libGL1-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522542" comment="Mesa-libGL1-32bit-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522543" comment="Mesa-libGLESv2-2-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522544" comment="Mesa-libGLESv2-2-32bit-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522545" comment="Mesa-libglapi0-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522546" comment="Mesa-libglapi0-32bit-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522547" comment="libgbm1-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522548" comment="libgbm1-32bit-18.0.2-8.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522549" comment="libxatracker2-1.0.0-8.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094</cve>
	<bugzilla href="https://bugzilla.suse.com/1152101">SUSE bug 1152101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009562635" comment="e2fsprogs-1.43.8-3.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562636" comment="libcom_err2-1.43.8-3.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562637" comment="libcom_err2-32bit-1.43.8-3.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562638" comment="libext2fs2-1.43.8-3.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188</cve>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522628" comment="e2fsprogs-1.43.8-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522629" comment="libcom_err2-1.43.8-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522630" comment="libcom_err2-32bit-1.43.8-3.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522631" comment="libext2fs2-1.43.8-3.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5435" ref_url="https://www.suse.com/security/cve/CVE-2019-5435" source="SUSE CVE"/>
    <description>
    An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5435/">CVE-2019-5435</cve>
	<bugzilla href="https://bugzilla.suse.com/1135176">SUSE bug 1135176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2009-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192009-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521212" comment="curl-7.37.0-37.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521213" comment="libcurl4-7.37.0-37.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521214" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522017" comment="curl-7.60.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522018" comment="libcurl4-7.60.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522019" comment="libcurl4-32bit-7.60.0-4.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2373-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192373-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html" source="SUSE-SU"/>
    <description>
    Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481</cve>
	<bugzilla href="https://bugzilla.suse.com/1149495">SUSE bug 1149495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522141" comment="curl-7.60.0-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522142" comment="libcurl4-7.60.0-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522143" comment="libcurl4-32bit-7.60.0-4.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2373-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192373-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522141" comment="curl-7.60.0-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522142" comment="libcurl4-7.60.0-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522143" comment="libcurl4-32bit-7.60.0-4.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="TID000019369" ref_url="https://www.suse.com/support/kb/doc/?id=000019369" source="SUSE-SU"/>
		<reference ref_id="TID7023616" ref_url="https://www.suse.com/support/kb/doc/?id=7023616" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5544" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5544" ref_url="https://www.suse.com/security/cve/CVE-2019-5544" source="SUSE CVE"/>
    <description>
    OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2022-01-14"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5544/">CVE-2019-5544</cve>
	<bugzilla href="https://bugzilla.suse.com/1157869">SUSE bug 1157869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334285" comment="openslp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5716" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5716" ref_url="https://www.suse.com/security/cve/CVE-2019-5716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.5, the 6LoWPAN dissector could crash. This was addressed in epan/dissectors/packet-6lowpan.c by avoiding use of a TVB before its creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5716/">CVE-2019-5716</cve>
	<bugzilla href="https://bugzilla.suse.com/1121231">SUSE bug 1121231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5717" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717</cve>
	<bugzilla href="https://bugzilla.suse.com/1121232">SUSE bug 1121232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521218" comment="libwireshark9-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521219" comment="libwiretap7-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521220" comment="libwscodecs1-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521221" comment="libwsutil8-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521222" comment="wireshark-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521223" comment="wireshark-gtk-2.4.12-48.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5718" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718</cve>
	<bugzilla href="https://bugzilla.suse.com/1121233">SUSE bug 1121233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521218" comment="libwireshark9-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521219" comment="libwiretap7-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521220" comment="libwscodecs1-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521221" comment="libwsutil8-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521222" comment="wireshark-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521223" comment="wireshark-gtk-2.4.12-48.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719</cve>
	<bugzilla href="https://bugzilla.suse.com/1121234">SUSE bug 1121234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521218" comment="libwireshark9-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521219" comment="libwiretap7-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521220" comment="libwscodecs1-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521221" comment="libwsutil8-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521222" comment="wireshark-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521223" comment="wireshark-gtk-2.4.12-48.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5721" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.11, the ENIP dissector could crash. This was addressed in epan/dissectors/packet-enip.c by changing the memory-management approach so that a use-after-free is avoided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721</cve>
	<bugzilla href="https://bugzilla.suse.com/1121235">SUSE bug 1121235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521218" comment="libwireshark9-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521219" comment="libwiretap7-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521220" comment="libwscodecs1-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521221" comment="libwsutil8-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521222" comment="wireshark-2.4.12-48.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521223" comment="wireshark-gtk-2.4.12-48.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5747" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-15"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747</cve>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338984" comment="busybox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125396">SUSE bug 1125396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5849" ref_url="https://www.suse.com/security/cve/CVE-2019-5849" source="SUSE CVE"/>
    <description>
    Out of bounds read in Skia in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5849/">CVE-2019-5849</cve>
	<bugzilla href="https://bugzilla.suse.com/1149321">SUSE bug 1149321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0925-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190925-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00098.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521764" comment="wget-1.14-21.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6110" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00041.html" source="SUSE-SU"/>
    <description>
    In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123028">SUSE bug 1123028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0144-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521244" comment="ghostscript-9.26a-23.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521245" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521246" comment="libspectre1-0.2.7-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html" source="SUSE-SU"/>
    <description>
    The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153715">SUSE bug 1153715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522397" comment="libtiff5-4.0.9-44.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522398" comment="libtiff5-32bit-4.0.9-44.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6129" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6129" ref_url="https://www.suse.com/security/cve/CVE-2019-6129" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** png_create_info_struct in png.c in libpng 1.6.36 has a memory leak, as demonstrated by pngcp. NOTE: a third party has stated "I don't think it is libpng's job to free this buffer."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-6129/">CVE-2019-6129</cve>
	<bugzilla href="https://bugzilla.suse.com/1121624">SUSE bug 1121624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333964" comment="libpng12 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334101" comment="libpng15 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334102" comment="libpng16 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html" source="SUSE-SU"/>
    <description>
    In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522036" comment="libpolkit0-32bit-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6212" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6216" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6226" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6227" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6229" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6237" ref_url="https://www.suse.com/security/cve/CVE-2019-6237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6237/">CVE-2019-6237</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6250" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250</cve>
	<bugzilla href="https://bugzilla.suse.com/1121717">SUSE bug 1121717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122012">SUSE bug 1122012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334177" comment="zeromq is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<bugzilla href="https://bugzilla.suse.com/1121894">SUSE bug 1121894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6446" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2462-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00015.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED **   An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is  a behavior that might have legitimate applications in (for example)  loading serialized Python object arrays from trusted and authenticated  sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521620" comment="python-numpy-1.8.0-5.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0425-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P2, 9.12.0 -&gt; 9.12.3-P2, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522222" comment="bind-utils-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522223" comment="libbind9-160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522224" comment="libdns169-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522225" comment="libirs160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522226" comment="libisc166-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522227" comment="libisc166-32bit-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522228" comment="libisccc160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522229" comment="libisccfg160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522230" comment="liblwres160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522231" comment="python-bind-9.11.2-3.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6467" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6467" ref_url="https://www.suse.com/security/cve/CVE-2019-6467" source="SUSE CVE"/>
    <description>
    A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally. The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a local copy of the root zone or using mirroring to provide the root zone, although other configurations are also possible. Versions affected: BIND 9.12.0-&gt; 9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6467/">CVE-2019-6467</cve>
	<bugzilla href="https://bugzilla.suse.com/1133186">SUSE bug 1133186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6470" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2657-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192657-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2727-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00048.html" source="SUSE-SU"/>
    <description>
    There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470</cve>
	<bugzilla href="https://bugzilla.suse.com/1134078">SUSE bug 1134078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334179" comment="dhcp is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522259" comment="dhcp-4.3.3-10.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522260" comment="dhcp-client-4.3.3-10.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6471" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00013.html" source="SUSE-SU"/>
    <description>
    A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -&gt; 9.11.7, 9.12.0 -&gt; 9.12.4-P1, 9.14.0 -&gt; 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -&gt; 9.11.7-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471</cve>
	<bugzilla href="https://bugzilla.suse.com/1138687">SUSE bug 1138687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522222" comment="bind-utils-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522223" comment="libbind9-160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522224" comment="libdns169-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522225" comment="libirs160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522226" comment="libisc166-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522227" comment="libisc166-32bit-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522228" comment="libisccc160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522229" comment="libisccfg160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522230" comment="liblwres160-9.11.2-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522231" comment="python-bind-9.11.2-3.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6475" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6475" ref_url="https://www.suse.com/security/cve/CVE-2019-6475" source="SUSE CVE"/>
    <description>
    Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other servers. A mirror zone is similar to a zone of type secondary, except that its data is subject to DNSSEC validation before being used in answers, as if it had been looked up via traditional recursion, and when mirror zone data cannot be validated, BIND falls back to using traditional recursion instead of the mirror zone. However, an error in the validity checks for the incoming zone data can allow an on-path attacker to replace zone data that was validated with a configured trust anchor with forged data of the attacker's choosing. The mirror zone feature is most often used to serve a local copy of the root zone. If an attacker was able to insert themselves into the network path between a recursive server using a mirror zone and a root name server, this vulnerability could then be used to cause the recursive server to accept a copy of falsified root zone data. This affects BIND versions 9.14.0 up to 9.14.6, and 9.15.0 up to 9.15.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6475/">CVE-2019-6475</cve>
	<bugzilla href="https://bugzilla.suse.com/1153993">SUSE bug 1153993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153994">SUSE bug 1153994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6476" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6476" ref_url="https://www.suse.com/security/cve/CVE-2019-6476" source="SUSE CVE"/>
    <description>
    A defect in code added to support QNAME minimization can cause named to exit with an assertion failure if a forwarder returns a referral rather than resolving the query. This affects BIND versions 9.14.0 up to 9.14.6, and 9.15.0 up to 9.15.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6476/">CVE-2019-6476</cve>
	<bugzilla href="https://bugzilla.suse.com/1153993">SUSE bug 1153993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153994">SUSE bug 1153994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6488" ref_url="https://www.suse.com/security/cve/CVE-2019-6488" source="SUSE CVE"/>
    <description>
    The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6488/">CVE-2019-6488</cve>
	<bugzilla href="https://bugzilla.suse.com/1122670">SUSE bug 1122670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6501" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6501" ref_url="https://www.suse.com/security/cve/CVE-2019-6501" source="SUSE CVE"/>
    <description>
    In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-6501/">CVE-2019-6501</cve>
	<bugzilla href="https://bugzilla.suse.com/1122722">SUSE bug 1122722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6706" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6706" ref_url="https://www.suse.com/security/cve/CVE-2019-6706" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6706/">CVE-2019-6706</cve>
	<bugzilla href="https://bugzilla.suse.com/1123043">SUSE bug 1123043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522455" comment="qemu-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522456" comment="qemu-block-curl-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522457" comment="qemu-ipxe-1.0.0+-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522458" comment="qemu-kvm-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522459" comment="qemu-seabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522460" comment="qemu-sgabios-8-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522461" comment="qemu-tools-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522462" comment="qemu-vgabios-1.11.0-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522463" comment="qemu-x86-2.11.2-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522502" comment="xen-4.11.1_04-2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522503" comment="xen-libs-4.11.1_04-2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522504" comment="xen-libs-32bit-4.11.1_04-2.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005123.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0276-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html" source="SUSE-SU"/>
    <description>
    gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123361">SUSE bug 1123361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521699" comment="gd-2.1.0-24.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521700" comment="gd-32bit-2.1.0-24.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html" source="SUSE-SU"/>
    <description>
    The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-05-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521699" comment="gd-2.1.0-24.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521700" comment="gd-32bit-2.1.0-24.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6988" ref_url="https://www.suse.com/security/cve/CVE-2019-6988" source="SUSE CVE"/>
    <description>
    An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers to cause a denial of service (attempted excessive memory allocation) in opj_calloc in openjp2/opj_malloc.c, when called from opj_tcd_init_tile in openjp2/tcd.c, as demonstrated by the 64-bit opj_decompress.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-6988/">CVE-2019-6988</cve>
	<bugzilla href="https://bugzilla.suse.com/1123492">SUSE bug 1123492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7146" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7146" ref_url="https://www.suse.com/security/cve/CVE-2019-7146" source="SUSE CVE"/>
    <description>
    In elfutils 0.175, there is a buffer over-read in the ebl_object_note function in eblobjnote.c in libebl. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted elf file, as demonstrated by eu-readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-7146/">CVE-2019-7146</cve>
	<bugzilla href="https://bugzilla.suse.com/1123545">SUSE bug 1123545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7149" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7149" ref_url="https://www.suse.com/security/cve/CVE-2019-7149" source="SUSE CVE"/>
    <description>
    A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7149/">CVE-2019-7149</cve>
	<bugzilla href="https://bugzilla.suse.com/1123559">SUSE bug 1123559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0645-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190645-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7285" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7292" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7308" ref_url="https://www.suse.com/security/cve/CVE-2019-7308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7308/">CVE-2019-7308</cve>
	<bugzilla href="https://bugzilla.suse.com/1124055">SUSE bug 1124055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7309" ref_url="https://www.suse.com/security/cve/CVE-2019-7309" source="SUSE CVE"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7309/">CVE-2019-7309</cve>
	<bugzilla href="https://bugzilla.suse.com/1124100">SUSE bug 1124100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165297">SUSE bug 1165297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333964" comment="libpng12 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334101" comment="libpng15 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333964" comment="libpng12 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334101" comment="libpng15 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7396" ref_url="https://www.suse.com/security/cve/CVE-2019-7396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7396/">CVE-2019-7396</cve>
	<bugzilla href="https://bugzilla.suse.com/1124367">SUSE bug 1124367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7574" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7575" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7576" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7577" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7578" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7635" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7636" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7637" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00071.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134135">SUSE bug 1134135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7638" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7663" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html" source="SUSE-SU"/>
    <description>
    An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF 4.0.10, affecting the cpSeparateBufToContigBuf function in tiffcp.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted tiff file. This is different from CVE-2018-12900.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663</cve>
	<bugzilla href="https://bugzilla.suse.com/1125113">SUSE bug 1125113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522397" comment="libtiff5-4.0.9-44.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522398" comment="libtiff5-32bit-4.0.9-44.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7664" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664" source="SUSE CVE"/>
    <description>
    In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664</cve>
	<bugzilla href="https://bugzilla.suse.com/1125008">SUSE bug 1125008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8375" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005360.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00005.html" source="SUSE-SU"/>
    <description>
    The UIProcess subsystem in WebKit, as used in WebKitGTK through 2.23.90 and WebKitGTK+ through 2.22.6 and other products, does not prevent the script dialog size from exceeding the web view size, which allows remote attackers to cause a denial of service (Buffer Overflow) or possibly have unspecified other impact, related to UIProcess/API/gtk/WebKitScriptDialogGtk.cpp, UIProcess/API/gtk/WebKitScriptDialogImpl.cpp, and UIProcess/API/gtk/WebKitWebViewGtk.cpp, as demonstrated by GNOME Web (aka Epiphany).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375</cve>
	<bugzilla href="https://bugzilla.suse.com/1126768">SUSE bug 1126768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521027" comment="libjavascriptcoregtk-4_0-18-2.24.0-2.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521028" comment="libwebkit2gtk-4_0-37-2.24.0-2.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521029" comment="libwebkit2gtk3-lang-2.24.0-2.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521030" comment="typelib-1_0-JavaScriptCore-4_0-2.24.0-2.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521031" comment="typelib-1_0-WebKit2-4_0-2.24.0-2.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521032" comment="webkit2gtk-4_0-injected-bundles-2.24.0-2.38.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8413" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8413" ref_url="https://www.suse.com/security/cve/CVE-2019-8413" source="SUSE CVE"/>
    <description>
    On Xiaomi MIX 2 devices with the 4.4.78 kernel, a NULL pointer dereference in the ioctl interface of the device file /dev/elliptic1 or /dev/elliptic0 causes a system crash via IOCTL 0x4008c575 (aka decimal 1074316661).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8413/">CVE-2019-8413</cve>
	<bugzilla href="https://bugzilla.suse.com/1125777">SUSE bug 1125777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html" source="SUSE-SU"/>
    <description>
    SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521516" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521517" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521518" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. A malicious website may be able to execute scripts in the context of another website.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8515" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A cross-origin issue existed with the fetch API. This was addressed with improved input validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may disclose sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8571" ref_url="https://www.suse.com/security/cve/CVE-2019-8571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8571/">CVE-2019-8571</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8583" ref_url="https://www.suse.com/security/cve/CVE-2019-8583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8583/">CVE-2019-8583</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8584" ref_url="https://www.suse.com/security/cve/CVE-2019-8584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8584/">CVE-2019-8584</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8586" ref_url="https://www.suse.com/security/cve/CVE-2019-8586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8586/">CVE-2019-8586</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8587" ref_url="https://www.suse.com/security/cve/CVE-2019-8587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8587/">CVE-2019-8587</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8594" ref_url="https://www.suse.com/security/cve/CVE-2019-8594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8594/">CVE-2019-8594</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8596" ref_url="https://www.suse.com/security/cve/CVE-2019-8596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8596/">CVE-2019-8596</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8597" ref_url="https://www.suse.com/security/cve/CVE-2019-8597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8597/">CVE-2019-8597</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8601" ref_url="https://www.suse.com/security/cve/CVE-2019-8601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8601/">CVE-2019-8601</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may result in the disclosure of process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8608" ref_url="https://www.suse.com/security/cve/CVE-2019-8608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8608/">CVE-2019-8608</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8609" ref_url="https://www.suse.com/security/cve/CVE-2019-8609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8609/">CVE-2019-8609</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8610" ref_url="https://www.suse.com/security/cve/CVE-2019-8610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8610/">CVE-2019-8610</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8611" ref_url="https://www.suse.com/security/cve/CVE-2019-8611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8611/">CVE-2019-8611</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8619" ref_url="https://www.suse.com/security/cve/CVE-2019-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8619/">CVE-2019-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8622" ref_url="https://www.suse.com/security/cve/CVE-2019-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8622/">CVE-2019-8622</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8623" ref_url="https://www.suse.com/security/cve/CVE-2019-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8623/">CVE-2019-8623</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A logic issue existed in the handling of synchronous page loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00070.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue existed in the handling of document loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00070.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8904" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8904" ref_url="https://www.suse.com/security/cve/CVE-2019-8904" source="SUSE CVE"/>
    <description>
    do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8904/">CVE-2019-8904</cve>
	<bugzilla href="https://bugzilla.suse.com/1126121">SUSE bug 1126121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334026" comment="file is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html" source="SUSE-SU"/>
    <description>
    do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905</cve>
	<bugzilla href="https://bugzilla.suse.com/1126117">SUSE bug 1126117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521750" comment="file-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521751" comment="file-magic-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521752" comment="libmagic1-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521753" comment="libmagic1-32bit-5.22-10.12.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8906" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html" source="SUSE-SU"/>
    <description>
    do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906</cve>
	<bugzilla href="https://bugzilla.suse.com/1126119">SUSE bug 1126119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521750" comment="file-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521751" comment="file-magic-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521752" comment="libmagic1-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521753" comment="libmagic1-32bit-5.22-10.12.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html" source="SUSE-SU"/>
    <description>
    do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907</cve>
	<bugzilla href="https://bugzilla.suse.com/1126117">SUSE bug 1126117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521750" comment="file-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521751" comment="file-magic-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521752" comment="libmagic1-5.22-10.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521753" comment="libmagic1-32bit-5.22-10.12.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="TID000019417" ref_url="https://www.suse.com/support/kb/doc/?id=000019417" source="SUSE-SU"/>
		<reference ref_id="TID7023740" ref_url="https://www.suse.com/support/kb/doc/?id=7023740" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<bugzilla href="https://bugzilla.suse.com/1125907">SUSE bug 1125907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126284">SUSE bug 1126284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8934" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
    <description>
    hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126455">SUSE bug 1126455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521765" comment="qemu-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521766" comment="qemu-block-curl-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521767" comment="qemu-ipxe-1.0.0+-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521768" comment="qemu-kvm-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521769" comment="qemu-seabios-1.10.2-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521770" comment="qemu-sgabios-8-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521771" comment="qemu-tools-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521772" comment="qemu-vgabios-1.10.2-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521773" comment="qemu-x86-2.9.1-6.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8936" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005280.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html" source="SUSE-SU"/>
    <description>
    NTP through 4.2.8p12 has a NULL Pointer Dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148892">SUSE bug 1148892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155513">SUSE bug 1155513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521702" comment="ntp-4.2.8p13-85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521703" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8956" ref_url="https://www.suse.com/security/cve/CVE-2019-8956" source="SUSE CVE"/>
    <description>
    In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-8956/">CVE-2019-8956</cve>
	<bugzilla href="https://bugzilla.suse.com/1124136">SUSE bug 1124136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8980" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8980" ref_url="https://www.suse.com/security/cve/CVE-2019-8980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8980/">CVE-2019-8980</cve>
	<bugzilla href="https://bugzilla.suse.com/1126209">SUSE bug 1126209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9003" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9003" ref_url="https://www.suse.com/security/cve/CVE-2019-9003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9003/">CVE-2019-9003</cve>
	<bugzilla href="https://bugzilla.suse.com/1126704">SUSE bug 1126704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9143" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9143" ref_url="https://www.suse.com/security/cve/CVE-2019-9143" source="SUSE CVE"/>
    <description>
    An issue was discovered in Exiv2 0.27. There is infinite recursion at Exiv2::Image::printTiffStructure in the file image.cpp. This can be triggered by a crafted file. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9143/">CVE-2019-9143</cve>
	<bugzilla href="https://bugzilla.suse.com/1127394">SUSE bug 1127394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9144" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9144" ref_url="https://www.suse.com/security/cve/CVE-2019-9144" source="SUSE CVE"/>
    <description>
    An issue was discovered in Exiv2 0.27. There is infinite recursion at BigTiffImage::printIFD in the file bigtiffimage.cpp. This can be triggered by a crafted file. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9144/">CVE-2019-9144</cve>
	<bugzilla href="https://bugzilla.suse.com/1127463">SUSE bug 1127463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9162" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9162" ref_url="https://www.suse.com/security/cve/CVE-2019-9162" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9162/">CVE-2019-9162</cve>
	<bugzilla href="https://bugzilla.suse.com/1127324">SUSE bug 1127324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146392">SUSE bug 1146392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521815" comment="glibc-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521816" comment="glibc-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521817" comment="glibc-devel-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521818" comment="glibc-devel-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521819" comment="glibc-i18ndata-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521820" comment="glibc-locale-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521821" comment="glibc-locale-32bit-2.22-100.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521822" comment="nscd-2.22-100.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9200" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9200" ref_url="https://www.suse.com/security/cve/CVE-2019-9200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    A heap-based buffer underwrite exists in ImageStream::getLine() located at Stream.cc in Poppler 0.74.0 that can (for example) be triggered by sending a crafted PDF file to the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9200/">CVE-2019-9200</cve>
	<bugzilla href="https://bugzilla.suse.com/1127329">SUSE bug 1127329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9208" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208</cve>
	<bugzilla href="https://bugzilla.suse.com/1127370">SUSE bug 1127370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521690" comment="libwireshark9-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521691" comment="libwiretap7-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521692" comment="libwscodecs1-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521693" comment="libwsutil8-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521694" comment="wireshark-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521695" comment="wireshark-gtk-2.4.13-48.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9209" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209</cve>
	<bugzilla href="https://bugzilla.suse.com/1127369">SUSE bug 1127369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521690" comment="libwireshark9-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521691" comment="libwiretap7-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521692" comment="libwscodecs1-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521693" comment="libwsutil8-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521694" comment="wireshark-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521695" comment="wireshark-gtk-2.4.13-48.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9213" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0645-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190645-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129016">SUSE bug 1129016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521704" comment="kernel-default-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521705" comment="kernel-default-devel-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521706" comment="kernel-default-extra-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521707" comment="kernel-devel-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521708" comment="kernel-macros-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521709" comment="kernel-source-4.4.176-94.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521710" comment="kernel-syms-4.4.176-94.88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214</cve>
	<bugzilla href="https://bugzilla.suse.com/1127367">SUSE bug 1127367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521690" comment="libwireshark9-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521691" comment="libwiretap7-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521692" comment="libwscodecs1-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521693" comment="libwsutil8-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521694" comment="wireshark-2.4.13-48.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521695" comment="wireshark-gtk-2.4.13-48.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9325" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9325" ref_url="https://www.suse.com/security/cve/CVE-2019-9325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html" source="SUSE-SU"/>
    <description>
    In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112001302
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9325/">CVE-2019-9325</cve>
	<bugzilla href="https://bugzilla.suse.com/1160612">SUSE bug 1160612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334008" comment="libvpx is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9371" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9371" ref_url="https://www.suse.com/security/cve/CVE-2019-9371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html" source="SUSE-SU"/>
    <description>
    In libvpx, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-132783254
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9371/">CVE-2019-9371</cve>
	<bugzilla href="https://bugzilla.suse.com/1160615">SUSE bug 1160615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334008" comment="libvpx is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9453" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9453" ref_url="https://www.suse.com/security/cve/CVE-2019-9453" source="SUSE CVE"/>
    <description>
    In the Android kernel in F2FS touch driver there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-9453/">CVE-2019-9453</cve>
	<bugzilla href="https://bugzilla.suse.com/1150028">SUSE bug 1150028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9454" ref_url="https://www.suse.com/security/cve/CVE-2019-9454" source="SUSE CVE"/>
    <description>
    In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9454/">CVE-2019-9454</cve>
	<bugzilla href="https://bugzilla.suse.com/1150023">SUSE bug 1150023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9466" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9466" ref_url="https://www.suse.com/security/cve/CVE-2019-9466" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-9503. Reason: This candidate is a duplicate of CVE-2019-9503. Notes: All CVE users should reference CVE-2019-9503 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9466/">CVE-2019-9466</cve>
	<bugzilla href="https://bugzilla.suse.com/1156653">SUSE bug 1156653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9496" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9496" ref_url="https://www.suse.com/security/cve/CVE-2019-9496" source="SUSE CVE"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
    <description>
    An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9496/">CVE-2019-9496</cve>
	<bugzilla href="https://bugzilla.suse.com/1131869">SUSE bug 1131869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9499" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500</cve>
	<bugzilla href="https://bugzilla.suse.com/1132681">SUSE bug 1132681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156653">SUSE bug 1156653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9578" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9578" ref_url="https://www.suse.com/security/cve/CVE-2019-9578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRDOETNQVM5LVLJRZMNGQEBNRFW4ZWEV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6NOI7O3I53SFL6DVLZH5VWF6EO4AISA/" source="SUSE-SU"/>
    <description>
    In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9578/">CVE-2019-9578</cve>
	<bugzilla href="https://bugzilla.suse.com/1128140">SUSE bug 1128140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521934" comment="libu2f-host0-1.1.6-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521935" comment="pam_u2f-1.0.8-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9619" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9619" ref_url="https://www.suse.com/security/cve/CVE-2019-9619" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9619/">CVE-2019-9619</cve>
	<bugzilla href="https://bugzilla.suse.com/1132164">SUSE bug 1132164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9633" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9633" ref_url="https://www.suse.com/security/cve/CVE-2019-9633" source="SUSE CVE"/>
    <description>
    gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrated by GNOME Web (aka Epiphany).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9633/">CVE-2019-9633</cve>
	<bugzilla href="https://bugzilla.suse.com/1129429">SUSE bug 1129429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334213" comment="glib2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521777" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521241" comment="python-devel-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521778" comment="python3-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521779" comment="python3-base-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521780" comment="python3-curses-3.4.6-25.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9704" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1389-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (daemon crash) via a large crontab file because the calloc return value is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704</cve>
	<bugzilla href="https://bugzilla.suse.com/1128937">SUSE bug 1128937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187508">SUSE bug 1187508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522015" comment="cron-4.2-59.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522016" comment="cronie-1.4.11-59.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9705" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1389-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (memory consumption) via a large crontab file because an unlimited number of lines is accepted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705</cve>
	<bugzilla href="https://bugzilla.suse.com/1128935">SUSE bug 1128935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187508">SUSE bug 1187508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522015" comment="cron-4.2-59.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522016" comment="cronie-1.4.11-59.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9706" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9706" ref_url="https://www.suse.com/security/cve/CVE-2019-9706" source="SUSE CVE"/>
    <description>
    Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (use-after-free and daemon crash) because of a force_rescan_user error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9706/">CVE-2019-9706</cve>
	<bugzilla href="https://bugzilla.suse.com/1128933">SUSE bug 1128933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339132" comment="cronie is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9755" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755</cve>
	<bugzilla href="https://bugzilla.suse.com/1130165">SUSE bug 1130165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521024" comment="libntfs-3g84-2013.1.13-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521025" comment="ntfs-3g-2013.1.13-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521026" comment="ntfsprogs-2013.1.13-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9801" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox &lt; 66.0.1, Firefox ESR &lt; 60.6.1, and Thunderbird &lt; 60.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR &lt; 60.9, Firefox ESR &lt; 68.1, and Firefox &lt; 69.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox &lt; 66.0.1, Firefox ESR &lt; 60.6.1, and Thunderbird &lt; 60.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
    <description>
    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521765" comment="qemu-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521766" comment="qemu-block-curl-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521767" comment="qemu-ipxe-1.0.0+-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521768" comment="qemu-kvm-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521769" comment="qemu-seabios-1.10.2-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521770" comment="qemu-sgabios-8-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521771" comment="qemu-tools-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521772" comment="qemu-vgabios-1.10.2-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521773" comment="qemu-x86-2.9.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522502" comment="xen-4.11.1_04-2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522503" comment="xen-libs-4.11.1_04-2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522504" comment="xen-libs-32bit-4.11.1_04-2.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9836" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00032.html" source="SUSE-SU"/>
    <description>
    Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836</cve>
	<bugzilla href="https://bugzilla.suse.com/1139383">SUSE bug 1139383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334186" comment="kernel-firmware is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521941" comment="kernel-firmware-20190618-5.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521942" comment="ucode-amd-20190618-5.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9848" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9848" ref_url="https://www.suse.com/security/cve/CVE-2019-9848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9848/">CVE-2019-9848</cve>
	<bugzilla href="https://bugzilla.suse.com/1141862">SUSE bug 1141862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146098">SUSE bug 1146098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146105">SUSE bug 1146105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522157" comment="libreoffice-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522158" comment="libreoffice-base-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522159" comment="libreoffice-base-drivers-postgresql-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522160" comment="libreoffice-branding-upstream-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522161" comment="libreoffice-calc-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522162" comment="libreoffice-calc-extensions-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522163" comment="libreoffice-draw-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522164" comment="libreoffice-filters-optional-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522165" comment="libreoffice-gnome-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522166" comment="libreoffice-gtk2-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522167" comment="libreoffice-icon-themes-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522168" comment="libreoffice-impress-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522169" comment="libreoffice-l10n-af-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522170" comment="libreoffice-l10n-ar-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522171" comment="libreoffice-l10n-ca-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522172" comment="libreoffice-l10n-cs-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522173" comment="libreoffice-l10n-da-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522174" comment="libreoffice-l10n-de-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522175" comment="libreoffice-l10n-en-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522176" comment="libreoffice-l10n-es-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522177" comment="libreoffice-l10n-fi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522178" comment="libreoffice-l10n-fr-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522179" comment="libreoffice-l10n-gu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522180" comment="libreoffice-l10n-hi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522181" comment="libreoffice-l10n-hu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522182" comment="libreoffice-l10n-it-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522183" comment="libreoffice-l10n-ja-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522184" comment="libreoffice-l10n-ko-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522185" comment="libreoffice-l10n-nb-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522186" comment="libreoffice-l10n-nl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522187" comment="libreoffice-l10n-nn-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522188" comment="libreoffice-l10n-pl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522189" comment="libreoffice-l10n-pt_BR-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522190" comment="libreoffice-l10n-pt_PT-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522191" comment="libreoffice-l10n-ro-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522192" comment="libreoffice-l10n-ru-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522193" comment="libreoffice-l10n-sk-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522194" comment="libreoffice-l10n-sv-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522195" comment="libreoffice-l10n-xh-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522196" comment="libreoffice-l10n-zh_CN-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522197" comment="libreoffice-l10n-zh_TW-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522198" comment="libreoffice-l10n-zu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522199" comment="libreoffice-mailmerge-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522200" comment="libreoffice-math-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522201" comment="libreoffice-officebean-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522202" comment="libreoffice-pyuno-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522203" comment="libreoffice-writer-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522204" comment="libreoffice-writer-extensions-6.2.7.1-43.56.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9849" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9849" ref_url="https://www.suse.com/security/cve/CVE-2019-9849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9849/">CVE-2019-9849</cve>
	<bugzilla href="https://bugzilla.suse.com/1141861">SUSE bug 1141861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522157" comment="libreoffice-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522158" comment="libreoffice-base-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522159" comment="libreoffice-base-drivers-postgresql-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522160" comment="libreoffice-branding-upstream-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522161" comment="libreoffice-calc-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522162" comment="libreoffice-calc-extensions-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522163" comment="libreoffice-draw-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522164" comment="libreoffice-filters-optional-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522165" comment="libreoffice-gnome-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522166" comment="libreoffice-gtk2-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522167" comment="libreoffice-icon-themes-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522168" comment="libreoffice-impress-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522169" comment="libreoffice-l10n-af-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522170" comment="libreoffice-l10n-ar-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522171" comment="libreoffice-l10n-ca-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522172" comment="libreoffice-l10n-cs-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522173" comment="libreoffice-l10n-da-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522174" comment="libreoffice-l10n-de-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522175" comment="libreoffice-l10n-en-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522176" comment="libreoffice-l10n-es-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522177" comment="libreoffice-l10n-fi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522178" comment="libreoffice-l10n-fr-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522179" comment="libreoffice-l10n-gu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522180" comment="libreoffice-l10n-hi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522181" comment="libreoffice-l10n-hu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522182" comment="libreoffice-l10n-it-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522183" comment="libreoffice-l10n-ja-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522184" comment="libreoffice-l10n-ko-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522185" comment="libreoffice-l10n-nb-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522186" comment="libreoffice-l10n-nl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522187" comment="libreoffice-l10n-nn-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522188" comment="libreoffice-l10n-pl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522189" comment="libreoffice-l10n-pt_BR-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522190" comment="libreoffice-l10n-pt_PT-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522191" comment="libreoffice-l10n-ro-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522192" comment="libreoffice-l10n-ru-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522193" comment="libreoffice-l10n-sk-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522194" comment="libreoffice-l10n-sv-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522195" comment="libreoffice-l10n-xh-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522196" comment="libreoffice-l10n-zh_CN-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522197" comment="libreoffice-l10n-zh_TW-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522198" comment="libreoffice-l10n-zu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522199" comment="libreoffice-mailmerge-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522200" comment="libreoffice-math-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522201" comment="libreoffice-officebean-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522202" comment="libreoffice-pyuno-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522203" comment="libreoffice-writer-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522204" comment="libreoffice-writer-extensions-6.2.7.1-43.56.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9850" ref_url="https://www.suse.com/security/cve/CVE-2019-9850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9850/">CVE-2019-9850</cve>
	<bugzilla href="https://bugzilla.suse.com/1146098">SUSE bug 1146098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522157" comment="libreoffice-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522158" comment="libreoffice-base-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522159" comment="libreoffice-base-drivers-postgresql-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522160" comment="libreoffice-branding-upstream-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522161" comment="libreoffice-calc-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522162" comment="libreoffice-calc-extensions-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522163" comment="libreoffice-draw-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522164" comment="libreoffice-filters-optional-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522165" comment="libreoffice-gnome-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522166" comment="libreoffice-gtk2-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522167" comment="libreoffice-icon-themes-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522168" comment="libreoffice-impress-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522169" comment="libreoffice-l10n-af-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522170" comment="libreoffice-l10n-ar-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522171" comment="libreoffice-l10n-ca-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522172" comment="libreoffice-l10n-cs-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522173" comment="libreoffice-l10n-da-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522174" comment="libreoffice-l10n-de-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522175" comment="libreoffice-l10n-en-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522176" comment="libreoffice-l10n-es-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522177" comment="libreoffice-l10n-fi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522178" comment="libreoffice-l10n-fr-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522179" comment="libreoffice-l10n-gu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522180" comment="libreoffice-l10n-hi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522181" comment="libreoffice-l10n-hu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522182" comment="libreoffice-l10n-it-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522183" comment="libreoffice-l10n-ja-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522184" comment="libreoffice-l10n-ko-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522185" comment="libreoffice-l10n-nb-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522186" comment="libreoffice-l10n-nl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522187" comment="libreoffice-l10n-nn-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522188" comment="libreoffice-l10n-pl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522189" comment="libreoffice-l10n-pt_BR-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522190" comment="libreoffice-l10n-pt_PT-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522191" comment="libreoffice-l10n-ro-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522192" comment="libreoffice-l10n-ru-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522193" comment="libreoffice-l10n-sk-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522194" comment="libreoffice-l10n-sv-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522195" comment="libreoffice-l10n-xh-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522196" comment="libreoffice-l10n-zh_CN-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522197" comment="libreoffice-l10n-zh_TW-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522198" comment="libreoffice-l10n-zu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522199" comment="libreoffice-mailmerge-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522200" comment="libreoffice-math-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522201" comment="libreoffice-officebean-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522202" comment="libreoffice-pyuno-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522203" comment="libreoffice-writer-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522204" comment="libreoffice-writer-extensions-6.2.7.1-43.56.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9851" ref_url="https://www.suse.com/security/cve/CVE-2019-9851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9851/">CVE-2019-9851</cve>
	<bugzilla href="https://bugzilla.suse.com/1146105">SUSE bug 1146105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522157" comment="libreoffice-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522158" comment="libreoffice-base-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522159" comment="libreoffice-base-drivers-postgresql-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522160" comment="libreoffice-branding-upstream-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522161" comment="libreoffice-calc-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522162" comment="libreoffice-calc-extensions-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522163" comment="libreoffice-draw-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522164" comment="libreoffice-filters-optional-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522165" comment="libreoffice-gnome-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522166" comment="libreoffice-gtk2-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522167" comment="libreoffice-icon-themes-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522168" comment="libreoffice-impress-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522169" comment="libreoffice-l10n-af-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522170" comment="libreoffice-l10n-ar-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522171" comment="libreoffice-l10n-ca-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522172" comment="libreoffice-l10n-cs-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522173" comment="libreoffice-l10n-da-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522174" comment="libreoffice-l10n-de-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522175" comment="libreoffice-l10n-en-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522176" comment="libreoffice-l10n-es-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522177" comment="libreoffice-l10n-fi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522178" comment="libreoffice-l10n-fr-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522179" comment="libreoffice-l10n-gu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522180" comment="libreoffice-l10n-hi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522181" comment="libreoffice-l10n-hu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522182" comment="libreoffice-l10n-it-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522183" comment="libreoffice-l10n-ja-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522184" comment="libreoffice-l10n-ko-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522185" comment="libreoffice-l10n-nb-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522186" comment="libreoffice-l10n-nl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522187" comment="libreoffice-l10n-nn-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522188" comment="libreoffice-l10n-pl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522189" comment="libreoffice-l10n-pt_BR-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522190" comment="libreoffice-l10n-pt_PT-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522191" comment="libreoffice-l10n-ro-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522192" comment="libreoffice-l10n-ru-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522193" comment="libreoffice-l10n-sk-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522194" comment="libreoffice-l10n-sv-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522195" comment="libreoffice-l10n-xh-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522196" comment="libreoffice-l10n-zh_CN-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522197" comment="libreoffice-l10n-zh_TW-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522198" comment="libreoffice-l10n-zu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522199" comment="libreoffice-mailmerge-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522200" comment="libreoffice-math-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522201" comment="libreoffice-officebean-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522202" comment="libreoffice-pyuno-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522203" comment="libreoffice-writer-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522204" comment="libreoffice-writer-extensions-6.2.7.1-43.56.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9852" ref_url="https://www.suse.com/security/cve/CVE-2019-9852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9852/">CVE-2019-9852</cve>
	<bugzilla href="https://bugzilla.suse.com/1146107">SUSE bug 1146107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149944">SUSE bug 1149944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522157" comment="libreoffice-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522158" comment="libreoffice-base-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522159" comment="libreoffice-base-drivers-postgresql-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522160" comment="libreoffice-branding-upstream-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522161" comment="libreoffice-calc-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522162" comment="libreoffice-calc-extensions-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522163" comment="libreoffice-draw-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522164" comment="libreoffice-filters-optional-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522165" comment="libreoffice-gnome-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522166" comment="libreoffice-gtk2-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522167" comment="libreoffice-icon-themes-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522168" comment="libreoffice-impress-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522169" comment="libreoffice-l10n-af-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522170" comment="libreoffice-l10n-ar-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522171" comment="libreoffice-l10n-ca-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522172" comment="libreoffice-l10n-cs-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522173" comment="libreoffice-l10n-da-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522174" comment="libreoffice-l10n-de-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522175" comment="libreoffice-l10n-en-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522176" comment="libreoffice-l10n-es-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522177" comment="libreoffice-l10n-fi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522178" comment="libreoffice-l10n-fr-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522179" comment="libreoffice-l10n-gu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522180" comment="libreoffice-l10n-hi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522181" comment="libreoffice-l10n-hu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522182" comment="libreoffice-l10n-it-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522183" comment="libreoffice-l10n-ja-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522184" comment="libreoffice-l10n-ko-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522185" comment="libreoffice-l10n-nb-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522186" comment="libreoffice-l10n-nl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522187" comment="libreoffice-l10n-nn-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522188" comment="libreoffice-l10n-pl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522189" comment="libreoffice-l10n-pt_BR-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522190" comment="libreoffice-l10n-pt_PT-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522191" comment="libreoffice-l10n-ro-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522192" comment="libreoffice-l10n-ru-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522193" comment="libreoffice-l10n-sk-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522194" comment="libreoffice-l10n-sv-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522195" comment="libreoffice-l10n-xh-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522196" comment="libreoffice-l10n-zh_CN-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522197" comment="libreoffice-l10n-zh_TW-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522198" comment="libreoffice-l10n-zu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522199" comment="libreoffice-mailmerge-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522200" comment="libreoffice-math-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522201" comment="libreoffice-officebean-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522202" comment="libreoffice-pyuno-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522203" comment="libreoffice-writer-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522204" comment="libreoffice-writer-extensions-6.2.7.1-43.56.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9854" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9854" ref_url="https://www.suse.com/security/cve/CVE-2019-9854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9854/">CVE-2019-9854</cve>
	<bugzilla href="https://bugzilla.suse.com/1149944">SUSE bug 1149944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522157" comment="libreoffice-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522158" comment="libreoffice-base-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522159" comment="libreoffice-base-drivers-postgresql-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522160" comment="libreoffice-branding-upstream-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522161" comment="libreoffice-calc-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522162" comment="libreoffice-calc-extensions-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522163" comment="libreoffice-draw-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522164" comment="libreoffice-filters-optional-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522165" comment="libreoffice-gnome-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522166" comment="libreoffice-gtk2-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522167" comment="libreoffice-icon-themes-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522168" comment="libreoffice-impress-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522169" comment="libreoffice-l10n-af-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522170" comment="libreoffice-l10n-ar-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522171" comment="libreoffice-l10n-ca-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522172" comment="libreoffice-l10n-cs-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522173" comment="libreoffice-l10n-da-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522174" comment="libreoffice-l10n-de-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522175" comment="libreoffice-l10n-en-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522176" comment="libreoffice-l10n-es-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522177" comment="libreoffice-l10n-fi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522178" comment="libreoffice-l10n-fr-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522179" comment="libreoffice-l10n-gu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522180" comment="libreoffice-l10n-hi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522181" comment="libreoffice-l10n-hu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522182" comment="libreoffice-l10n-it-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522183" comment="libreoffice-l10n-ja-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522184" comment="libreoffice-l10n-ko-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522185" comment="libreoffice-l10n-nb-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522186" comment="libreoffice-l10n-nl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522187" comment="libreoffice-l10n-nn-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522188" comment="libreoffice-l10n-pl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522189" comment="libreoffice-l10n-pt_BR-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522190" comment="libreoffice-l10n-pt_PT-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522191" comment="libreoffice-l10n-ro-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522192" comment="libreoffice-l10n-ru-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522193" comment="libreoffice-l10n-sk-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522194" comment="libreoffice-l10n-sv-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522195" comment="libreoffice-l10n-xh-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522196" comment="libreoffice-l10n-zh_CN-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522197" comment="libreoffice-l10n-zh_TW-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522198" comment="libreoffice-l10n-zu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522199" comment="libreoffice-mailmerge-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522200" comment="libreoffice-math-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522201" comment="libreoffice-officebean-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522202" comment="libreoffice-pyuno-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522203" comment="libreoffice-writer-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522204" comment="libreoffice-writer-extensions-6.2.7.1-43.56.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9855" ref_url="https://www.suse.com/security/cve/CVE-2019-9855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" source="SUSE-SU"/>
    <description>
    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9855/">CVE-2019-9855</cve>
	<bugzilla href="https://bugzilla.suse.com/1149943">SUSE bug 1149943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522157" comment="libreoffice-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522158" comment="libreoffice-base-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522159" comment="libreoffice-base-drivers-postgresql-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522160" comment="libreoffice-branding-upstream-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522161" comment="libreoffice-calc-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522162" comment="libreoffice-calc-extensions-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522163" comment="libreoffice-draw-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522164" comment="libreoffice-filters-optional-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522165" comment="libreoffice-gnome-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522166" comment="libreoffice-gtk2-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522167" comment="libreoffice-icon-themes-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522168" comment="libreoffice-impress-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522169" comment="libreoffice-l10n-af-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522170" comment="libreoffice-l10n-ar-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522171" comment="libreoffice-l10n-ca-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522172" comment="libreoffice-l10n-cs-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522173" comment="libreoffice-l10n-da-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522174" comment="libreoffice-l10n-de-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522175" comment="libreoffice-l10n-en-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522176" comment="libreoffice-l10n-es-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522177" comment="libreoffice-l10n-fi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522178" comment="libreoffice-l10n-fr-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522179" comment="libreoffice-l10n-gu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522180" comment="libreoffice-l10n-hi-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522181" comment="libreoffice-l10n-hu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522182" comment="libreoffice-l10n-it-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522183" comment="libreoffice-l10n-ja-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522184" comment="libreoffice-l10n-ko-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522185" comment="libreoffice-l10n-nb-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522186" comment="libreoffice-l10n-nl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522187" comment="libreoffice-l10n-nn-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522188" comment="libreoffice-l10n-pl-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522189" comment="libreoffice-l10n-pt_BR-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522190" comment="libreoffice-l10n-pt_PT-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522191" comment="libreoffice-l10n-ro-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522192" comment="libreoffice-l10n-ru-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522193" comment="libreoffice-l10n-sk-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522194" comment="libreoffice-l10n-sv-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522195" comment="libreoffice-l10n-xh-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522196" comment="libreoffice-l10n-zh_CN-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522197" comment="libreoffice-l10n-zh_TW-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522198" comment="libreoffice-l10n-zu-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522199" comment="libreoffice-mailmerge-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522200" comment="libreoffice-math-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522201" comment="libreoffice-officebean-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522202" comment="libreoffice-pyuno-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522203" comment="libreoffice-writer-6.2.7.1-43.56.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522204" comment="libreoffice-writer-extensions-6.2.7.1-43.56.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9857" ref_url="https://www.suse.com/security/cve/CVE-2019-9857" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.0.2, the function inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c neglects to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark(), which will cause a memory leak (aka refcount leak). Finally, this will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9857/">CVE-2019-9857</cve>
	<bugzilla href="https://bugzilla.suse.com/1129896">SUSE bug 1129896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html" source="SUSE-SU"/>
    <description>
    libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9904" ref_url="https://www.suse.com/security/cve/CVE-2019-9904" source="SUSE CVE"/>
    <description>
    An issue was discovered in lib\cdt\dttree.c in libcdt.a in graphviz 2.40.1. Stack consumption occurs because of recursive agclose calls in lib\cgraph\graph.c in libcgraph.a, related to agfstsubg in lib\cgraph\subg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9904/">CVE-2019-9904</cve>
	<bugzilla href="https://bugzilla.suse.com/1130628">SUSE bug 1130628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334142" comment="graphviz is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0838-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html" source="SUSE-SU"/>
    <description>
    rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924</cve>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521744" comment="bash-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521746" comment="bash-lang-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521747" comment="libreadline6-6.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521748" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1300-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0678-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-05/msg00129.html" source="SUSE-SU"/>
    <description>
    GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521519" comment="gstreamer-0_10-plugins-base-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521520" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521521" comment="gstreamer-0_10-plugins-base-lang-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521493" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521495" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521522" comment="libgstapp-0_10-0-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521523" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521496" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521497" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521498" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521499" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521500" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521501" comment="libgstfft-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521524" comment="libgstinterfaces-0_10-0-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521525" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521502" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521503" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521504" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521505" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521506" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521507" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521508" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521509" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521510" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521511" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521512" comment="typelib-1_0-GstAudio-1_0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521513" comment="typelib-1_0-GstPbutils-1_0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521514" comment="typelib-1_0-GstTag-1_0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521515" comment="typelib-1_0-GstVideo-1_0-1.8.3-13.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936</cve>
	<bugzilla href="https://bugzilla.suse.com/1130326">SUSE bug 1130326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937</cve>
	<bugzilla href="https://bugzilla.suse.com/1130325">SUSE bug 1130325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9948" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html" source="SUSE-SU"/>
    <description>
    urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521241" comment="python-devel-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006459.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00012.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162191">SUSE bug 1162191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522604" comment="libQt5Concurrent5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522605" comment="libQt5Core5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522606" comment="libQt5DBus5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522607" comment="libQt5Gui5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522608" comment="libQt5Network5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522609" comment="libQt5OpenGL5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522610" comment="libQt5PrintSupport5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522611" comment="libQt5Sql5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522612" comment="libQt5Sql5-mysql-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522613" comment="libQt5Sql5-postgresql-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522614" comment="libQt5Sql5-sqlite-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522615" comment="libQt5Sql5-unixODBC-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522616" comment="libQt5Test5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522617" comment="libQt5Widgets5-5.6.2-6.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522618" comment="libQt5Xml5-5.6.2-6.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10251" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10251" ref_url="https://www.suse.com/security/cve/CVE-2020-10251" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.9, an out-of-bounds read vulnerability exists within the ReadHEICImageByID function in coders\heic.c. It can be triggered via an image with a width or height value that exceeds the actual size of the image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10251/">CVE-2020-10251</cve>
	<bugzilla href="https://bugzilla.suse.com/1166225">SUSE bug 1166225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10702" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702" source="SUSE CVE"/>
    <description>
    A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702</cve>
	<bugzilla href="https://bugzilla.suse.com/1168681">SUSE bug 1168681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10717" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10717" ref_url="https://www.suse.com/security/cve/CVE-2020-10717" source="SUSE CVE"/>
    <description>
    A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version &gt;= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10717/">CVE-2020-10717</cve>
	<bugzilla href="https://bugzilla.suse.com/1171110">SUSE bug 1171110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0987-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184743">SUSE bug 1184743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761</cve>
	<bugzilla href="https://bugzilla.suse.com/1172710">SUSE bug 1172710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11102" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102" source="SUSE CVE"/>
    <description>
    hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102</cve>
	<bugzilla href="https://bugzilla.suse.com/1168713">SUSE bug 1168713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11655" ref_url="https://www.suse.com/security/cve/CVE-2020-11655" source="SUSE CVE"/>
    <description>
    SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11655/">CVE-2020-11655</cve>
	<bugzilla href="https://bugzilla.suse.com/1169126">SUSE bug 1169126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11656" ref_url="https://www.suse.com/security/cve/CVE-2020-11656" source="SUSE CVE"/>
    <description>
    In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11656/">CVE-2020-11656</cve>
	<bugzilla href="https://bugzilla.suse.com/1169111">SUSE bug 1169111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11810" ref_url="https://www.suse.com/security/cve/CVE-2020-11810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11810/">CVE-2020-11810</cve>
	<bugzilla href="https://bugzilla.suse.com/1169925">SUSE bug 1169925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334133" comment="openvpn is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11869" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869" source="SUSE CVE"/>
    <description>
    An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869</cve>
	<bugzilla href="https://bugzilla.suse.com/1170537">SUSE bug 1170537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435</cve>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631</cve>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632</cve>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13791" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13791" ref_url="https://www.suse.com/security/cve/CVE-2020-13791" source="SUSE CVE"/>
    <description>
    hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13791/">CVE-2020-13791</cve>
	<bugzilla href="https://bugzilla.suse.com/1172494">SUSE bug 1172494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800</cve>
	<bugzilla href="https://bugzilla.suse.com/1172495">SUSE bug 1172495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13871" ref_url="https://www.suse.com/security/cve/CVE-2020-13871" source="SUSE CVE"/>
    <description>
    SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13871/">CVE-2020-13871</cve>
	<bugzilla href="https://bugzilla.suse.com/1172646">SUSE bug 1172646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13902" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13902" ref_url="https://www.suse.com/security/cve/CVE-2020-13902" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.9-27 through 7.0.10-17 has a heap-based buffer over-read in BlobToStringInfo in MagickCore/string.c during TIFF image decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13902/">CVE-2020-13902</cve>
	<bugzilla href="https://bugzilla.suse.com/1172642">SUSE bug 1172642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14356" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-02-08"/>
	<updated date="2022-02-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176392">SUSE bug 1176392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14373" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14373" ref_url="https://www.suse.com/security/cve/CVE-2020-14373" source="SUSE CVE"/>
    <description>
    A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14373/">CVE-2020-14373</cve>
	<bugzilla href="https://bugzilla.suse.com/1176133">SUSE bug 1176133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14415" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14415" ref_url="https://www.suse.com/security/cve/CVE-2020-14415" source="SUSE CVE"/>
    <description>
    oss_write in audio/ossaudio.c in QEMU before 5.0.0 mishandles a buffer position.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14415/">CVE-2020-14415</cve>
	<bugzilla href="https://bugzilla.suse.com/1173109">SUSE bug 1173109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358</cve>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15365" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15365" ref_url="https://www.suse.com/security/cve/CVE-2020-15365" source="SUSE CVE"/>
    <description>
    LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15365/">CVE-2020-15365</cve>
	<bugzilla href="https://bugzilla.suse.com/1173517">SUSE bug 1173517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15523" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523</cve>
	<bugzilla href="https://bugzilla.suse.com/1173745">SUSE bug 1173745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15704" ref_url="https://www.suse.com/security/cve/CVE-2020-15704" source="SUSE CVE"/>
    <description>
    The modprobe child process in the ./debian/patches/load_ppp_generic_if_needed patch file incorrectly handled module loading. A local non-root attacker could exploit the MODPROBE_OPTIONS environment variable to read arbitrary root files. Fixed in 2.4.5-5ubuntu1.4, 2.4.5-5.1ubuntu2.3+esm2, 2.4.7-1+2ubuntu1.16.04.3, 2.4.7-2+2ubuntu1.3, 2.4.7-2+4.1ubuntu5.1, 2.4.7-2+4.1ubuntu6. Was ZDI-CAN-11504.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15704/">CVE-2020-15704</cve>
	<bugzilla href="https://bugzilla.suse.com/1174891">SUSE bug 1174891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339004" comment="ppp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15801" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The &lt;executable-name&gt;._pth file (e.g., the python._pth file) is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801</cve>
	<bugzilla href="https://bugzilla.suse.com/1174241">SUSE bug 1174241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15859" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15859" ref_url="https://www.suse.com/security/cve/CVE-2020-15859" source="SUSE CVE"/>
    <description>
    QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15859/">CVE-2020-15859</cve>
	<bugzilla href="https://bugzilla.suse.com/1174373">SUSE bug 1174373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15888" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15888" ref_url="https://www.suse.com/security/cve/CVE-2020-15888" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15888/">CVE-2020-15888</cve>
	<bugzilla href="https://bugzilla.suse.com/1174367">SUSE bug 1174367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15889" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15889" ref_url="https://www.suse.com/security/cve/CVE-2020-15889" source="SUSE CVE"/>
    <description>
    Lua 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-15889/">CVE-2020-15889</cve>
	<bugzilla href="https://bugzilla.suse.com/1174371">SUSE bug 1174371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15945" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15945" ref_url="https://www.suse.com/security/cve/CVE-2020-15945" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15945/">CVE-2020-15945</cve>
	<bugzilla href="https://bugzilla.suse.com/1174540">SUSE bug 1174540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092</cve>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1699" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1699" ref_url="https://www.suse.com/security/cve/CVE-2020-1699" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html" source="SUSE-SU"/>
    <description>
    A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine running the Ceph dashboard.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1699/">CVE-2020-1699</cve>
	<bugzilla href="https://bugzilla.suse.com/1161074">SUSE bug 1161074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:46-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:47-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:48-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:98-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:99-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006464.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html" source="SUSE-SU"/>
    <description>
    A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1730" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00018.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730</cve>
	<bugzilla href="https://bugzilla.suse.com/1168699">SUSE bug 1168699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17489" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00028.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489</cve>
	<bugzilla href="https://bugzilla.suse.com/1175155">SUSE bug 1175155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334171" comment="gnome-shell is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0945-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html" source="SUSE-SU"/>
    <description>
    Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967</cve>
	<bugzilla href="https://bugzilla.suse.com/1169407">SUSE bug 1169407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333943" comment="openssl-1_0_0 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333941" comment="compat-openssl098 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334207" comment="compat-openssl098.703 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007427.html" source="SUSE-SU"/>
		<reference ref_id="TID000019697" ref_url="https://www.suse.com/support/kb/doc/?id=000019697" source="SUSE-SU"/>
    <description>
    The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177243">SUSE bug 1177243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333943" comment="openssl-1_0_0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24342" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24342" ref_url="https://www.suse.com/security/cve/CVE-2020-24342" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24342/">CVE-2020-24342</cve>
	<bugzilla href="https://bugzilla.suse.com/1175339">SUSE bug 1175339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352</cve>
	<bugzilla href="https://bugzilla.suse.com/1175370">SUSE bug 1175370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24369" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24369" ref_url="https://www.suse.com/security/cve/CVE-2020-24369" source="SUSE CVE"/>
    <description>
    ldebug.c in Lua 5.4.0 attempts to access debug information via the line hook of a stripped function, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24369/">CVE-2020-24369</cve>
	<bugzilla href="https://bugzilla.suse.com/1175447">SUSE bug 1175447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370</cve>
	<bugzilla href="https://bugzilla.suse.com/1175448">SUSE bug 1175448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371</cve>
	<bugzilla href="https://bugzilla.suse.com/1175449">SUSE bug 1175449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5208" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00031.html" source="SUSE-SU"/>
    <description>
    It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208</cve>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522667" comment="ipmitool-1.8.18-5.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6750" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6750" ref_url="https://www.suse.com/security/cve/CVE-2020-6750" source="SUSE CVE"/>
    <description>
    GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity, even though there is no technical barrier to a direct connection. NOTE: versions before 2.60 are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6750/">CVE-2020-6750</cve>
	<bugzilla href="https://bugzilla.suse.com/1160668">SUSE bug 1160668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334213" comment="glib2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
    <description>
    A content process could have modified shared memory relating to crash reporting information, crash itself, and cause an out-of-bound write. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 73 and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6797" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    By downloading a file with the .fileloc extension, a semi-privileged extension could launch an arbitrary application on the user's computer. The attacker is restricted as they are unable to download non-quarantined files or supply command line arguments to the application, limiting the impact. Note: this issue only occurs on Mac OSX. Other operating systems are unaffected. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6799" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 73 and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7044" ref_url="https://www.suse.com/security/cve/CVE-2020-7044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.x before 3.2.1, the WASSP dissector could crash. This was addressed in epan/dissectors/packet-wassp.c by using &gt;= and &lt;= to resolve off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7044/">CVE-2020-7044</cve>
	<bugzilla href="https://bugzilla.suse.com/1161052">SUSE bug 1161052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7045" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7045" ref_url="https://www.suse.com/security/cve/CVE-2020-7045" source="SUSE CVE"/>
    <description>
    In Wireshark 3.0.x before 3.0.8, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by validating opcodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-7045/">CVE-2020-7045</cve>
	<bugzilla href="https://bugzilla.suse.com/1161061">SUSE bug 1161061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7216" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7216" ref_url="https://www.suse.com/security/cve/CVE-2020-7216" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00005.html" source="SUSE-SU"/>
    <description>
    An ni_dhcp4_parse_response memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets without a message type option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7216/">CVE-2020-7216</cve>
	<bugzilla href="https://bugzilla.suse.com/1160905">SUSE bug 1160905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522632" comment="wicked-0.6.60-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522633" comment="wicked-service-0.6.60-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7217" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7217" ref_url="https://www.suse.com/security/cve/CVE-2020-7217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00011.html" source="SUSE-SU"/>
    <description>
    An ni_dhcp4_fsm_process_dhcp4_packet memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets with a different client-id.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7217/">CVE-2020-7217</cve>
	<bugzilla href="https://bugzilla.suse.com/1160906">SUSE bug 1160906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522632" comment="wicked-0.6.60-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522633" comment="wicked-service-0.6.60-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7221" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7221" ref_url="https://www.suse.com/security/cve/CVE-2020-7221" source="SUSE CVE"/>
    <description>
    mysql_install_db in MariaDB 10.4.7 through 10.4.11 allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely, as demonstrated by a symlink attack on a chmod 04755 of auth_pam_tool_dir/auth_pam_tool. NOTE: this does not affect the Oracle MySQL product, which implements mysql_install_db differently.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7221/">CVE-2020-7221</cve>
	<bugzilla href="https://bugzilla.suse.com/1160285">SUSE bug 1160285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160868">SUSE bug 1160868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8013" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:81-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:82-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562739" comment="permissions-20170707-3.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different issue than CVE-2020-6851.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8315" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8315" ref_url="https://www.suse.com/security/cve/CVE-2020-8315" source="SUSE CVE"/>
    <description>
    In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker's copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system's copy. Windows 8 and later are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8315/">CVE-2020-8315</cve>
	<bugzilla href="https://bugzilla.suse.com/1173935">SUSE bug 1173935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<bugzilla href="https://bugzilla.suse.com/1162109">SUSE bug 1162109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html" source="SUSE-SU"/>
    <description>
    eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 12</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327</cve>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334017" version="1" comment="kernel-default is ==0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333928" version="1" comment="kernel-source is ==0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159517" version="1" comment="sled-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239879" version="1" comment="sled-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141432" version="1" comment="krb5 is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141433" version="1" comment="krb5-32bit is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141434" version="1" comment="krb5-client is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115941" version="1" comment="krb5 is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115942" version="1" comment="krb5-32bit is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115943" version="1" comment="krb5-client is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140703" version="1" comment="krb5 is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140704" version="1" comment="krb5-32bit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140705" version="1" comment="krb5-client is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512206" version="1" comment="krb5 is &lt;1.12.5-40.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512207" version="1" comment="krb5-32bit is &lt;1.12.5-40.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512208" version="1" comment="krb5-client is &lt;1.12.5-40.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118774" version="1" comment="sled-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128016" version="1" comment="sled-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116183" version="1" comment="sled-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333977" version="1" comment="curl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141414" version="1" comment="hplip is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141415" version="1" comment="hplip-hpijs is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141416" version="1" comment="hplip-sane is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159029" version="1" comment="hplip is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159030" version="1" comment="hplip-hpijs is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159031" version="1" comment="hplip-sane is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514381" version="1" comment="mailx is &lt;12.5-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142038" version="1" comment="mailx is &lt;12.5-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141041" version="1" comment="mailx is &lt;12.5-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519025" version="1" comment="libid3tag0 is &lt;0.15.1b-184.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173108" version="1" comment="libid3tag0 is &lt;0.15.1b-184.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333938" version="1" comment="glibc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512004" version="1" comment="zoo is &lt;2.10-1020.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141279" version="1" comment="cron is &lt;4.2-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141280" version="1" comment="cronie is &lt;1.4.11-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140508" version="1" comment="cron is &lt;4.2-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140509" version="1" comment="cronie is &lt;1.4.11-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140886" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141069" version="1" comment="perl-Tk is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334122" version="1" comment="python is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141572" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-59.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141573" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-59.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141574" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141575" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141576" version="1" comment="openssl is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142000" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142001" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142002" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142003" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142004" version="1" comment="openssl is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140890" version="1" comment="libopenssl-devel is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131148" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131149" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140891" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140892" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140895" version="1" comment="openssl is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148318" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149123" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149124" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148319" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148320" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148321" version="1" comment="openssl is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512362" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512366" version="1" comment="libopenssl-devel is &lt;1.0.2p-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512368" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512369" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512363" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512364" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512370" version="1" comment="libopenssl1_1 is &lt;1.1.1-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512371" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512367" version="1" comment="openssl is &lt;1.0.2p-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512365" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334331" version="1" comment="clamav is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334003" version="1" comment="ghostscript is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518545" version="1" comment="gimp is &lt;2.8.18-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518546" version="1" comment="gimp-lang is &lt;2.8.18-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518547" version="1" comment="gimp-plugins-python is &lt;2.8.18-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518548" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518549" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150803" version="1" comment="gimp is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150804" version="1" comment="gimp-lang is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150805" version="1" comment="gimp-plugins-python is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150806" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150807" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167012" version="1" comment="gimp is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167013" version="1" comment="gimp-lang is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167014" version="1" comment="gimp-plugins-python is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167015" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167016" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334321" version="1" comment="sysstat is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141676" version="1" comment="librpcsecgss3 is &lt;0.19-16.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140495" version="1" comment="coolkey is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512065" version="1" comment="coolkey is &lt;1.1.0-148.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515793" version="1" comment="libecpg6 is &lt;9.4.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515794" version="1" comment="libpq5 is &lt;9.4.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515795" version="1" comment="libpq5-32bit is &lt;9.4.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515790" version="1" comment="postgresql93 is &lt;9.3.11-14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515796" version="1" comment="postgresql94 is &lt;9.4.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131139" version="1" comment="libecpg6 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131140" version="1" comment="libpq5 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131141" version="1" comment="libpq5-32bit is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131142" version="1" comment="postgresql94 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159129" version="1" comment="libecpg6 is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159130" version="1" comment="libpq5 is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159131" version="1" comment="libpq5-32bit is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159132" version="1" comment="postgresql96 is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512304" version="1" comment="libecpg6 is &lt;10.5-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512305" version="1" comment="libpq5 is &lt;10.5-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512306" version="1" comment="libpq5-32bit is &lt;10.5-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512307" version="1" comment="postgresql10 is &lt;10.5-1.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141565" version="1" comment="libmysqlclient18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141566" version="1" comment="libmysqlclient18-32bit is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141567" version="1" comment="libmysqlclient_r18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141568" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141569" version="1" comment="mariadb is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141570" version="1" comment="mariadb-client is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141571" version="1" comment="mariadb-errormessages is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141993" version="1" comment="libmysqlclient18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141994" version="1" comment="libmysqlclient18-32bit is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141995" version="1" comment="libmysqlclient_r18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141996" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141997" version="1" comment="mariadb is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141998" version="1" comment="mariadb-client is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141999" version="1" comment="mariadb-errormessages is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131128" version="1" comment="libmysqlclient18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131129" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131130" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131131" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131132" version="1" comment="mariadb is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131133" version="1" comment="mariadb-client is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131134" version="1" comment="mariadb-errormessages is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159163" version="1" comment="libmysqlclient18 is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159164" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159650" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159651" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159165" version="1" comment="mariadb is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159166" version="1" comment="mariadb-client is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159167" version="1" comment="mariadb-errormessages is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512354" version="1" comment="libmysqlclient18 is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512355" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512356" version="1" comment="libmysqlclient_r18 is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512357" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512573" version="1" comment="mariadb is &lt;10.2.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512358" version="1" comment="mariadb-100-errormessages is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512574" version="1" comment="mariadb-client is &lt;10.2.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512575" version="1" comment="mariadb-errormessages is &lt;10.2.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339511" version="1" comment="zsh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141505" version="1" comment="libecpg6 is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141506" version="1" comment="libpq5 is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141507" version="1" comment="libpq5-32bit is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141508" version="1" comment="postgresql93 is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141965" version="1" comment="libecpg6 is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141966" version="1" comment="libpq5 is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141967" version="1" comment="libpq5-32bit is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141968" version="1" comment="postgresql94 is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141562" version="1" comment="libmikmod3 is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141563" version="1" comment="libmikmod3-32bit is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141815" version="1" comment="telepathy-idle is &lt;0.2.0-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334068" version="1" comment="pcre is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141790" version="1" comment="qemu is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141791" version="1" comment="qemu-block-curl is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141792" version="1" comment="qemu-ipxe is &lt;1.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141793" version="1" comment="qemu-kvm is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141794" version="1" comment="qemu-seabios is &lt;1.7.4-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141795" version="1" comment="qemu-sgabios is &lt;8-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141796" version="1" comment="qemu-tools is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141797" version="1" comment="qemu-vgabios is &lt;1.7.4-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141798" version="1" comment="qemu-x86 is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142048" version="1" comment="qemu is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142049" version="1" comment="qemu-block-curl is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142050" version="1" comment="qemu-ipxe is &lt;1.0.0-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142051" version="1" comment="qemu-kvm is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142052" version="1" comment="qemu-seabios is &lt;1.8.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142053" version="1" comment="qemu-sgabios is &lt;8-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142054" version="1" comment="qemu-tools is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142055" version="1" comment="qemu-vgabios is &lt;1.8.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142056" version="1" comment="qemu-x86 is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141087" version="1" comment="qemu is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141089" version="1" comment="qemu-block-curl is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141093" version="1" comment="qemu-ipxe is &lt;1.0.0-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141094" version="1" comment="qemu-kvm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141098" version="1" comment="qemu-seabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141099" version="1" comment="qemu-sgabios is &lt;8-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141100" version="1" comment="qemu-tools is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141101" version="1" comment="qemu-vgabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141102" version="1" comment="qemu-x86 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159276" version="1" comment="qemu is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159278" version="1" comment="qemu-block-curl is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159282" version="1" comment="qemu-ipxe is &lt;1.0.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159283" version="1" comment="qemu-kvm is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159287" version="1" comment="qemu-seabios is &lt;1.10.2-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159288" version="1" comment="qemu-sgabios is &lt;8-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159289" version="1" comment="qemu-tools is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159290" version="1" comment="qemu-vgabios is &lt;1.10.2-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159291" version="1" comment="qemu-x86 is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512603" version="1" comment="qemu is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512604" version="1" comment="qemu-block-curl is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512605" version="1" comment="qemu-ipxe is &lt;1.0.0-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512606" version="1" comment="qemu-kvm is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512607" version="1" comment="qemu-seabios is &lt;1.11.0-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512608" version="1" comment="qemu-sgabios is &lt;8-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512609" version="1" comment="qemu-tools is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512610" version="1" comment="qemu-vgabios is &lt;1.11.0-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512611" version="1" comment="qemu-x86 is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141677" version="1" comment="libsilc-1_1-2 is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141678" version="1" comment="libsilcclient-1_1-3 is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141679" version="1" comment="silc-toolkit is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141724" version="1" comment="libvorbis0 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140999" version="1" comment="libvorbis0-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141725" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141001" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141726" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141003" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178202" version="1" comment="libvorbis0 is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178203" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178204" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178205" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178206" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178207" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518396" version="1" comment="openssh is &lt;7.2p2-74.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518397" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518398" version="1" comment="openssh-helpers is &lt;7.2p2-74.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512583" version="1" comment="openssh is &lt;7.2p2-74.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512584" version="1" comment="openssh-helpers is &lt;7.2p2-74.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141823" version="1" comment="vorbis-tools is &lt;1.4.0-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141824" version="1" comment="vorbis-tools-lang is &lt;1.4.0-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115051" version="1" comment="vorbis-tools is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115052" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141536" version="1" comment="libid3tag0 is &lt;0.15.1b-182.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516634" version="1" comment="libjasper1 is &lt;1.900.14-181.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516635" version="1" comment="libjasper1-32bit is &lt;1.900.14-181.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150812" version="1" comment="libjasper1 is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150813" version="1" comment="libjasper1-32bit is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177649" version="1" comment="libjasper1 is &lt;1.900.14-195.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177650" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141061" version="1" comment="pam_krb5 is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141062" version="1" comment="pam_krb5-32bit is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141749" version="1" comment="libxml2-2 is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141750" version="1" comment="libxml2-2-32bit is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141751" version="1" comment="libxml2-tools is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141788" version="1" comment="python-libxml2 is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103731" version="1" comment="libxml2-2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103732" version="1" comment="libxml2-2-32bit is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103737" version="1" comment="libxml2-tools is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103738" version="1" comment="python-libxml2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141032" version="1" comment="libxml2-2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141033" version="1" comment="libxml2-2-32bit is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141035" version="1" comment="libxml2-tools is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141083" version="1" comment="python-libxml2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157768" version="1" comment="libxml2-2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157769" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157770" version="1" comment="libxml2-tools is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157771" version="1" comment="python-libxml2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512561" version="1" comment="libxml2-2 is &lt;2.9.4-46.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512562" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512563" version="1" comment="libxml2-tools is &lt;2.9.4-46.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512597" version="1" comment="python-libxml2 is &lt;2.9.4-46.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141373" version="1" comment="glib2-lang is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141374" version="1" comment="glib2-tools is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141375" version="1" comment="libgio-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141376" version="1" comment="libgio-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141377" version="1" comment="libgio-fam is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141378" version="1" comment="libglib-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141379" version="1" comment="libglib-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141380" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141381" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141382" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141383" version="1" comment="libgobject-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141384" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141385" version="1" comment="libgthread-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140606" version="1" comment="glib2-lang is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140607" version="1" comment="glib2-tools is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140608" version="1" comment="libgio-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140609" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142107" version="1" comment="libgio-fam is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140610" version="1" comment="libglib-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140611" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140612" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140613" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140614" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140615" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140616" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140617" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141340" version="1" comment="flash-player is &lt;11.2.202.406-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141341" version="1" comment="flash-player-gnome is &lt;11.2.202.406-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116120" version="1" comment="flash-player is &lt;11.2.202.548-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116121" version="1" comment="flash-player-gnome is &lt;11.2.202.548-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141348" version="1" comment="g3utils is &lt;1.1.36-54.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141349" version="1" comment="mgetty is &lt;1.1.36-54.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141409" version="1" comment="gnutls is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141410" version="1" comment="libgnutls28 is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141411" version="1" comment="libgnutls28-32bit is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114253" version="1" comment="gnutls is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114258" version="1" comment="libgnutls28 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114259" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159004" version="1" comment="gnutls is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159006" version="1" comment="libgnutls28 is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159007" version="1" comment="libgnutls28-32bit is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512177" version="1" comment="gnutls is &lt;3.3.27-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512178" version="1" comment="libgnutls28 is &lt;3.3.27-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512179" version="1" comment="libgnutls28-32bit is &lt;3.3.27-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141201" version="1" comment="MozillaFirefox is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141202" version="1" comment="MozillaFirefox-translations is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116011" version="1" comment="MozillaFirefox is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116014" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131144" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131145" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157344" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157346" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512011" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512012" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141299" version="1" comment="dia is &lt;0.97.2-13.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141300" version="1" comment="dia-lang is &lt;0.97.2-13.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142087" version="1" comment="dia is &lt;0.97.3-15.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142088" version="1" comment="dia-lang is &lt;0.97.3-15.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141209" version="1" comment="alsa is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141210" version="1" comment="libasound2 is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140446" version="1" comment="libasound2-32bit is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158925" version="1" comment="alsa is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158927" version="1" comment="libasound2 is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158928" version="1" comment="libasound2-32bit is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333954" version="1" comment="libvirt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141289" version="1" comment="curl is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141290" version="1" comment="libcurl4 is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141291" version="1" comment="libcurl4-32bit is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110168" version="1" comment="curl is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110172" version="1" comment="libcurl4 is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110171" version="1" comment="libcurl4-32bit is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131101" version="1" comment="curl is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131102" version="1" comment="libcurl4 is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131103" version="1" comment="libcurl4-32bit is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154400" version="1" comment="curl is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154401" version="1" comment="libcurl4 is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154402" version="1" comment="libcurl4-32bit is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512093" version="1" comment="curl is &lt;7.60.0-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512094" version="1" comment="libcurl4 is &lt;7.60.0-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512095" version="1" comment="libcurl4-32bit is &lt;7.60.0-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141758" version="1" comment="ntp is &lt;4.2.6p5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141759" version="1" comment="ntp-doc is &lt;4.2.6p5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142039" version="1" comment="ntp is &lt;4.2.8p4-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142040" version="1" comment="ntp-doc is &lt;4.2.8p4-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128799" version="1" comment="ntp is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128800" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159252" version="1" comment="ntp is &lt;4.2.8p10-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159253" version="1" comment="ntp-doc is &lt;4.2.8p10-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512577" version="1" comment="ntp is &lt;4.2.8p12-64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512578" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141281" version="1" comment="cups is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141282" version="1" comment="cups-client is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141283" version="1" comment="cups-libs is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141284" version="1" comment="cups-libs-32bit is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110315" version="1" comment="cups is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110316" version="1" comment="cups-client is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110319" version="1" comment="cups-libs is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110320" version="1" comment="cups-libs-32bit is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140510" version="1" comment="cups is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140511" version="1" comment="cups-client is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140512" version="1" comment="cups-libs is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140513" version="1" comment="cups-libs-32bit is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158952" version="1" comment="cups is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158953" version="1" comment="cups-client is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158954" version="1" comment="cups-libs is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158955" version="1" comment="cups-libs-32bit is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512085" version="1" comment="cups is &lt;1.7.5-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512086" version="1" comment="cups-client is &lt;1.7.5-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512087" version="1" comment="cups-libs is &lt;1.7.5-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512088" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141680" version="1" comment="libsndfile1 is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141681" version="1" comment="libsndfile1-32bit is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105600" version="1" comment="libsndfile1 is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105601" version="1" comment="libsndfile1-32bit is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119271" version="1" comment="libsndfile1 is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119272" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155684" version="1" comment="libsndfile1 is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155685" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512465" version="1" comment="libsndfile1 is &lt;1.0.25-36.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512466" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140673" version="1" comment="gvim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140674" version="1" comment="vim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140675" version="1" comment="vim-data is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157587" version="1" comment="gvim is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157588" version="1" comment="vim is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157589" version="1" comment="vim-data is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141044" version="1" comment="opensc is &lt;0.13.0-1.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140518" version="1" comment="cyrus-sasl is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140519" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140520" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140521" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140522" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141292" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140523" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140524" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140527" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140528" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140529" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140532" version="1" comment="libsasl2-3 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140533" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512096" version="1" comment="cyrus-sasl is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512097" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512098" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512099" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512100" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512101" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512102" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512103" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512104" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512105" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512106" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512107" version="1" comment="libsasl2-3 is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512108" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141227" version="1" comment="bind-libs is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141228" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141229" version="1" comment="bind-utils is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141847" version="1" comment="bind-libs is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141848" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141849" version="1" comment="bind-utils is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131136" version="1" comment="bind-libs is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131137" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131138" version="1" comment="bind-utils is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157662" version="1" comment="bind-libs is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157663" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157664" version="1" comment="bind-utils is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512039" version="1" comment="bind-utils is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512040" version="1" comment="libbind9-160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512041" version="1" comment="libdns169 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512042" version="1" comment="libirs160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512043" version="1" comment="libisc166 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512044" version="1" comment="libisc166-32bit is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512045" version="1" comment="libisccc160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512046" version="1" comment="libisccfg160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512047" version="1" comment="liblwres160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512048" version="1" comment="python-bind is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141212" version="1" comment="avahi is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141213" version="1" comment="avahi-lang is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141214" version="1" comment="libavahi-client3 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141215" version="1" comment="libavahi-client3-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141216" version="1" comment="libavahi-common3 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141217" version="1" comment="libavahi-common3-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141218" version="1" comment="libavahi-core7 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141219" version="1" comment="libdns_sd is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141220" version="1" comment="libdns_sd-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140467" version="1" comment="avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140468" version="1" comment="avahi-lang is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140470" version="1" comment="libavahi-client3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140471" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140472" version="1" comment="libavahi-common3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140473" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140474" version="1" comment="libavahi-core7 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140475" version="1" comment="libdns_sd is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140476" version="1" comment="libdns_sd-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141806" version="1" comment="strongswan is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141807" version="1" comment="strongswan-doc is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141808" version="1" comment="strongswan-ipsec is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141809" version="1" comment="strongswan-libs0 is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110995" version="1" comment="strongswan is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110997" version="1" comment="strongswan-doc is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110999" version="1" comment="strongswan-ipsec is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111000" version="1" comment="strongswan-libs0 is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119278" version="1" comment="strongswan is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119279" version="1" comment="strongswan-doc is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119280" version="1" comment="strongswan-ipsec is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119281" version="1" comment="strongswan-libs0 is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156341" version="1" comment="strongswan is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156342" version="1" comment="strongswan-doc is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156343" version="1" comment="strongswan-ipsec is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156344" version="1" comment="strongswan-libs0 is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161786" version="1" comment="strongswan is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161787" version="1" comment="strongswan-doc is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161788" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161789" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141435" version="1" comment="lcms is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140713" version="1" comment="liblcms1 is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140714" version="1" comment="liblcms1-32bit is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141591" version="1" comment="libpoppler-glib8 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141592" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141593" version="1" comment="libpoppler44 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141594" version="1" comment="poppler-tools is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140905" version="1" comment="libpoppler-glib8 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140906" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128640" version="1" comment="libpoppler44 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140907" version="1" comment="libpoppler60 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140908" version="1" comment="poppler-tools is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512385" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512386" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512387" version="1" comment="libpoppler60 is &lt;0.43.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512388" version="1" comment="poppler-tools is &lt;0.43.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141612" version="1" comment="libqt4 is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141613" version="1" comment="libqt4-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141614" version="1" comment="libqt4-qt3support is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141615" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141616" version="1" comment="libqt4-sql is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141617" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141618" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141619" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141620" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141621" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141622" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141623" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141624" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141625" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141626" version="1" comment="libqt4-x11 is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141627" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113431" version="1" comment="libqt4 is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113430" version="1" comment="libqt4-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113436" version="1" comment="libqt4-qt3support is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113435" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113438" version="1" comment="libqt4-sql is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113437" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113424" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113423" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113427" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113426" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113440" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113439" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113429" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113428" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113442" version="1" comment="libqt4-x11 is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113441" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125268" version="1" comment="libqt4 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125269" version="1" comment="libqt4-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125270" version="1" comment="libqt4-qt3support is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125271" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125272" version="1" comment="libqt4-sql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125273" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125274" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125275" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125277" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125278" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125279" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125280" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125281" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125282" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125283" version="1" comment="libqt4-x11 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125284" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512399" version="1" comment="libqt4 is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512400" version="1" comment="libqt4-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512401" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512402" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512403" version="1" comment="libqt4-sql is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512404" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512405" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512406" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512407" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512408" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512409" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512410" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512411" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512412" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512413" version="1" comment="libqt4-x11 is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512414" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141345" version="1" comment="ft2demos is &lt;2.5.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141519" version="1" comment="libfreetype6 is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141520" version="1" comment="libfreetype6-32bit is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141861" version="1" comment="ft2demos is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141969" version="1" comment="libfreetype6 is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141970" version="1" comment="libfreetype6-32bit is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140589" version="1" comment="ft2demos is &lt;2.6.3-7.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140587" version="1" comment="libfreetype6 is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140588" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158992" version="1" comment="ft2demos is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159136" version="1" comment="libfreetype6 is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159137" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171102" version="1" comment="ft2demos is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171103" version="1" comment="libfreetype6 is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171104" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141827" version="1" comment="wireshark is &lt;1.10.9-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114951" version="1" comment="wireshark is &lt;1.12.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131146" version="1" comment="wireshark is &lt;1.12.13-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157263" version="1" comment="libwireshark8 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157264" version="1" comment="libwiretap6 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157265" version="1" comment="libwscodecs1 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157266" version="1" comment="libwsutil7 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157267" version="1" comment="wireshark is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157268" version="1" comment="wireshark-gtk is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512530" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512531" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512532" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512533" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512534" version="1" comment="wireshark is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512535" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141063" version="1" comment="pam_ssh is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141064" version="1" comment="pam_ssh-32bit is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514965" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-242.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333974" version="1" comment="gnutls is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140719" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141436" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140720" version="1" comment="openexr is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172641" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172642" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172643" version="1" comment="openexr is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141747" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141748" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108092" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108093" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131022" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131023" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141234" version="1" comment="cifs-utils is &lt;6.4-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141457" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141458" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141459" version="1" comment="libdcerpc0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141460" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141461" version="1" comment="libgensec0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141462" version="1" comment="libgensec0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141463" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141464" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141465" version="1" comment="libndr-nbt0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141466" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141467" version="1" comment="libndr-standard0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141468" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141469" version="1" comment="libndr0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141470" version="1" comment="libndr0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141471" version="1" comment="libnetapi0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141472" version="1" comment="libnetapi0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141473" version="1" comment="libpdb0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141474" version="1" comment="libpdb0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141475" version="1" comment="libregistry0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141476" version="1" comment="libsamba-credentials0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141477" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141478" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141479" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141480" version="1" comment="libsamba-util0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141481" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141482" version="1" comment="libsamdb0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141483" version="1" comment="libsamdb0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141484" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141485" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141486" version="1" comment="libsmbclient0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141487" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141488" version="1" comment="libsmbconf0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141489" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141490" version="1" comment="libsmbldap0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141491" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141492" version="1" comment="libtevent-util0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141493" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141494" version="1" comment="libwbclient0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141495" version="1" comment="libwbclient0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141496" version="1" comment="samba is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141497" version="1" comment="samba-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141498" version="1" comment="samba-client is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141499" version="1" comment="samba-client-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141500" version="1" comment="samba-doc is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141501" version="1" comment="samba-libs is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141502" version="1" comment="samba-libs-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141503" version="1" comment="samba-winbind is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141504" version="1" comment="samba-winbind-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141851" version="1" comment="cifs-utils is &lt;6.4-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141917" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141918" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141919" version="1" comment="libdcerpc0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141920" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141921" version="1" comment="libgensec0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141922" version="1" comment="libgensec0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141923" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141924" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141925" version="1" comment="libndr-nbt0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141926" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141927" version="1" comment="libndr-standard0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141928" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141929" version="1" comment="libndr0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141930" version="1" comment="libndr0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141931" version="1" comment="libnetapi0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141932" version="1" comment="libnetapi0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141933" version="1" comment="libregistry0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141934" version="1" comment="libsamba-credentials0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141935" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141936" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141937" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141938" version="1" comment="libsamba-passdb0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141939" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141940" version="1" comment="libsamba-util0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141941" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141942" version="1" comment="libsamdb0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141943" version="1" comment="libsamdb0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141944" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141945" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141946" version="1" comment="libsmbclient0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141947" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141948" version="1" comment="libsmbconf0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141949" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141950" version="1" comment="libsmbldap0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141951" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141952" version="1" comment="libtevent-util0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141953" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141954" version="1" comment="libwbclient0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141955" version="1" comment="libwbclient0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141956" version="1" comment="samba is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141957" version="1" comment="samba-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141958" version="1" comment="samba-client is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141959" version="1" comment="samba-client-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141960" version="1" comment="samba-doc is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141961" version="1" comment="samba-libs is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141962" version="1" comment="samba-libs-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141963" version="1" comment="samba-winbind is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141964" version="1" comment="samba-winbind-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140488" version="1" comment="cifs-utils is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131768" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140794" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140795" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140796" version="1" comment="libdcerpc0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140797" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140798" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140799" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140800" version="1" comment="libndr-nbt0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140801" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140802" version="1" comment="libndr-standard0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140803" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140804" version="1" comment="libndr0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140805" version="1" comment="libndr0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140806" version="1" comment="libnetapi0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140807" version="1" comment="libnetapi0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140808" version="1" comment="libsamba-credentials0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140809" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140810" version="1" comment="libsamba-errors0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140811" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140812" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140813" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140814" version="1" comment="libsamba-passdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140815" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140816" version="1" comment="libsamba-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140817" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140818" version="1" comment="libsamdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140819" version="1" comment="libsamdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140820" version="1" comment="libsmbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140821" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140822" version="1" comment="libsmbconf0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140823" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140824" version="1" comment="libsmbldap0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140825" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140826" version="1" comment="libtevent-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140827" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140828" version="1" comment="libwbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140829" version="1" comment="libwbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140830" version="1" comment="samba is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140831" version="1" comment="samba-client is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140832" version="1" comment="samba-client-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140833" version="1" comment="samba-doc is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140834" version="1" comment="samba-libs is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140835" version="1" comment="samba-libs-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140836" version="1" comment="samba-winbind is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140837" version="1" comment="samba-winbind-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159085" version="1" comment="libdcerpc-binding0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159086" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159087" version="1" comment="libdcerpc0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159088" version="1" comment="libdcerpc0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159089" version="1" comment="libndr-krb5pac0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159090" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159091" version="1" comment="libndr-nbt0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159092" version="1" comment="libndr-nbt0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159093" version="1" comment="libndr-standard0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159094" version="1" comment="libndr-standard0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159095" version="1" comment="libndr0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159096" version="1" comment="libndr0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159097" version="1" comment="libnetapi0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159098" version="1" comment="libnetapi0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159099" version="1" comment="libsamba-credentials0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159100" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159101" version="1" comment="libsamba-errors0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159102" version="1" comment="libsamba-errors0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159103" version="1" comment="libsamba-hostconfig0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159104" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159105" version="1" comment="libsamba-passdb0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159106" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159107" version="1" comment="libsamba-util0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159108" version="1" comment="libsamba-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159109" version="1" comment="libsamdb0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159110" version="1" comment="libsamdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159111" version="1" comment="libsmbclient0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159112" version="1" comment="libsmbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159113" version="1" comment="libsmbconf0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159114" version="1" comment="libsmbconf0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159115" version="1" comment="libsmbldap0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159116" version="1" comment="libsmbldap0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159117" version="1" comment="libtevent-util0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159118" version="1" comment="libtevent-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159119" version="1" comment="libwbclient0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159120" version="1" comment="libwbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159121" version="1" comment="samba is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159122" version="1" comment="samba-client is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159123" version="1" comment="samba-client-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159124" version="1" comment="samba-doc is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159125" version="1" comment="samba-libs is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159126" version="1" comment="samba-libs-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159127" version="1" comment="samba-winbind is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159128" version="1" comment="samba-winbind-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512063" version="1" comment="cifs-utils is &lt;6.5-9.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512260" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512261" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512262" version="1" comment="libdcerpc0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512263" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512264" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512265" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512266" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512267" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512268" version="1" comment="libndr-standard0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512269" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512270" version="1" comment="libndr0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512271" version="1" comment="libndr0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512272" version="1" comment="libnetapi0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512273" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512274" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512275" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512276" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512277" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512278" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512279" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512280" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512281" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512282" version="1" comment="libsamba-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512283" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512284" version="1" comment="libsamdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512285" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512286" version="1" comment="libsmbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512287" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512288" version="1" comment="libsmbconf0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512289" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512290" version="1" comment="libsmbldap0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512291" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512292" version="1" comment="libtevent-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512293" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512294" version="1" comment="libwbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512295" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512296" version="1" comment="samba is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512297" version="1" comment="samba-client is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512298" version="1" comment="samba-client-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512299" version="1" comment="samba-doc is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512300" version="1" comment="samba-libs is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512301" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512302" version="1" comment="samba-winbind is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512303" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141297" version="1" comment="dhcp is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141298" version="1" comment="dhcp-client is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141857" version="1" comment="dhcp is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141858" version="1" comment="dhcp-client is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130039" version="1" comment="dhcp is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130040" version="1" comment="dhcp-client is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173784" version="1" comment="dhcp is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173785" version="1" comment="dhcp-client is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141703" version="1" comment="libtiff5 is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141704" version="1" comment="libtiff5-32bit is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114060" version="1" comment="libtiff5 is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114059" version="1" comment="libtiff5-32bit is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131042" version="1" comment="libtiff5 is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131043" version="1" comment="libtiff5-32bit is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154403" version="1" comment="libtiff5 is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154404" version="1" comment="libtiff5-32bit is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512495" version="1" comment="libtiff5 is &lt;4.0.9-44.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512496" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140887" version="1" comment="libneon27 is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140677" version="1" comment="gzip is &lt;1.6-7.392" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512188" version="1" comment="gzip is &lt;1.6-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141325" version="1" comment="expat is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141326" version="1" comment="libexpat1 is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141327" version="1" comment="libexpat1-32bit is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128464" version="1" comment="expat is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128465" version="1" comment="libexpat1 is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128466" version="1" comment="libexpat1-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148243" version="1" comment="expat is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148244" version="1" comment="libexpat1 is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148245" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162480" version="1" comment="expat is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162481" version="1" comment="libexpat1 is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162482" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141329" version="1" comment="fetchmail is &lt;6.3.26-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140569" version="1" comment="fetchmail is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141334" version="1" comment="finch is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141335" version="1" comment="libpurple is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141336" version="1" comment="libpurple-lang is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141337" version="1" comment="libpurple-meanwhile is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141338" version="1" comment="libpurple-tcl is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141339" version="1" comment="pidgin is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102676" version="1" comment="finch is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102678" version="1" comment="libpurple is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102681" version="1" comment="libpurple-lang is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102682" version="1" comment="libpurple-meanwhile is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102683" version="1" comment="libpurple-tcl is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102684" version="1" comment="pidgin is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142094" version="1" comment="finch is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142095" version="1" comment="libpurple is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142096" version="1" comment="libpurple-lang is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142097" version="1" comment="libpurple-meanwhile is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142098" version="1" comment="libpurple-tcl is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142099" version="1" comment="pidgin is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159634" version="1" comment="finch is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159635" version="1" comment="libpurple is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159636" version="1" comment="libpurple-branding-upstream is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159637" version="1" comment="libpurple-lang is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159638" version="1" comment="libpurple-plugin-sametime is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159639" version="1" comment="libpurple-tcl is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159640" version="1" comment="pidgin is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512126" version="1" comment="finch is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512127" version="1" comment="libpurple is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512128" version="1" comment="libpurple-branding-upstream is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512129" version="1" comment="libpurple-lang is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512130" version="1" comment="libpurple-plugin-sametime is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512131" version="1" comment="libpurple-tcl is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512132" version="1" comment="pidgin is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142140" version="1" comment="libnewt0_52 is &lt;0.52.16-1.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141346" version="1" comment="fuse is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141347" version="1" comment="libfuse2 is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110488" version="1" comment="fuse is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110491" version="1" comment="libfuse2 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512133" version="1" comment="fuse is &lt;2.9.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512134" version="1" comment="libfuse2 is &lt;2.9.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141067" version="1" comment="perl-HTML-Parser is &lt;3.71-1.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140875" version="1" comment="libltdl7 is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140876" version="1" comment="libltdl7-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159156" version="1" comment="libltdl7 is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159157" version="1" comment="libltdl7-32bit is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512352" version="1" comment="libltdl7 is &lt;2.4.2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512353" version="1" comment="libltdl7-32bit is &lt;2.4.2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141423" version="1" comment="kernel-default is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141424" version="1" comment="kernel-default-devel is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141425" version="1" comment="kernel-default-extra is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141426" version="1" comment="kernel-devel is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141427" version="1" comment="kernel-macros is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141428" version="1" comment="kernel-source is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141429" version="1" comment="kernel-syms is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141430" version="1" comment="kernel-xen is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141431" version="1" comment="kernel-xen-devel is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141892" version="1" comment="kernel-default-devel is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141893" version="1" comment="kernel-default-extra is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141894" version="1" comment="kernel-devel is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141895" version="1" comment="kernel-macros is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141896" version="1" comment="kernel-source is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141897" version="1" comment="kernel-syms is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141898" version="1" comment="kernel-xen is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141899" version="1" comment="kernel-xen-devel is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140697" version="1" comment="kernel-default-devel is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142128" version="1" comment="kernel-default-extra is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140699" version="1" comment="kernel-devel is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140700" version="1" comment="kernel-macros is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140701" version="1" comment="kernel-source is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140702" version="1" comment="kernel-syms is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159037" version="1" comment="kernel-default-devel is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159648" version="1" comment="kernel-default-extra is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159039" version="1" comment="kernel-devel is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159040" version="1" comment="kernel-macros is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159041" version="1" comment="kernel-source is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159042" version="1" comment="kernel-syms is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512197" version="1" comment="kernel-default is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512198" version="1" comment="kernel-default-devel is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512199" version="1" comment="kernel-default-extra is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512200" version="1" comment="kernel-devel is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512201" version="1" comment="kernel-macros is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512202" version="1" comment="kernel-source is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512203" version="1" comment="kernel-syms is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140966" version="1" comment="libthai-data is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140967" version="1" comment="libthai0 is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140968" version="1" comment="libthai0-32bit is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140466" version="1" comment="m4 is &lt;1.4.16-15.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141123" version="1" comment="ruby is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141386" version="1" comment="glibc is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141387" version="1" comment="glibc-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141388" version="1" comment="glibc-devel is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141389" version="1" comment="glibc-devel-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141390" version="1" comment="glibc-i18ndata is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141391" version="1" comment="glibc-locale is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141392" version="1" comment="glibc-locale-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141393" version="1" comment="nscd is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141868" version="1" comment="glibc is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141869" version="1" comment="glibc-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141870" version="1" comment="glibc-devel is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141871" version="1" comment="glibc-devel-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141872" version="1" comment="glibc-i18ndata is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141873" version="1" comment="glibc-locale is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141874" version="1" comment="glibc-locale-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141875" version="1" comment="nscd is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140618" version="1" comment="glibc is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140619" version="1" comment="glibc-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140620" version="1" comment="glibc-devel is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140621" version="1" comment="glibc-devel-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140623" version="1" comment="glibc-i18ndata is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140625" version="1" comment="glibc-locale is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140626" version="1" comment="glibc-locale-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140629" version="1" comment="nscd is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156957" version="1" comment="glibc is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156958" version="1" comment="glibc-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156959" version="1" comment="glibc-devel is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156960" version="1" comment="glibc-devel-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156961" version="1" comment="glibc-i18ndata is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156962" version="1" comment="glibc-locale is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156963" version="1" comment="glibc-locale-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156964" version="1" comment="nscd is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512152" version="1" comment="glibc is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512153" version="1" comment="glibc-32bit is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512154" version="1" comment="glibc-devel is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512155" version="1" comment="glibc-devel-32bit is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512156" version="1" comment="glibc-i18ndata is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512157" version="1" comment="glibc-locale is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512158" version="1" comment="glibc-locale-32bit is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512159" version="1" comment="nscd is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140645" version="1" comment="groff is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514602" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-73.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514603" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-73.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333942" version="1" comment="openssl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334050" version="1" comment="ruby is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521815" version="1" comment="glibc is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521816" version="1" comment="glibc-32bit is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521817" version="1" comment="glibc-devel is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521818" version="1" comment="glibc-devel-32bit is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521819" version="1" comment="glibc-i18ndata is &lt;2.22-100.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521820" version="1" comment="glibc-locale is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521821" version="1" comment="glibc-locale-32bit is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521822" version="1" comment="nscd is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141231" version="1" comment="bzip2 is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141235" version="1" comment="clamav is &lt;0.98.4-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141232" version="1" comment="libbz2-1 is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141233" version="1" comment="libbz2-1-32bit is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109618" version="1" comment="clamav is &lt;0.98.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140483" version="1" comment="bzip2 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140489" version="1" comment="clamav is &lt;0.99.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140485" version="1" comment="libbz2-1 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140486" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157660" version="1" comment="clamav is &lt;0.99.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512064" version="1" comment="clamav is &lt;0.100.2-33.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140900" version="1" comment="libpcsclite1 is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141582" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140901" version="1" comment="pcsc-lite is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147770" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147771" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147772" version="1" comment="pcsc-lite is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512377" version="1" comment="libpcsclite1 is &lt;1.8.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512378" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512379" version="1" comment="pcsc-lite is &lt;1.8.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141245" version="1" comment="cpio is &lt;2.11-26.182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141246" version="1" comment="cpio-lang is &lt;2.11-26.182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141247" version="1" comment="tar is &lt;1.27.1-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141248" version="1" comment="tar-lang is &lt;1.27.1-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102938" version="1" comment="cpio is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102939" version="1" comment="cpio-lang is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139103" version="1" comment="tar is &lt;1.27.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139104" version="1" comment="tar-lang is &lt;1.27.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136443" version="1" comment="tar is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136445" version="1" comment="tar-lang is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158948" version="1" comment="cpio is &lt;2.11-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158949" version="1" comment="cpio-lang is &lt;2.11-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159313" version="1" comment="tar is &lt;1.27.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159314" version="1" comment="tar-lang is &lt;1.27.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512068" version="1" comment="cpio is &lt;2.11-36.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512069" version="1" comment="cpio-lang is &lt;2.11-36.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512622" version="1" comment="tar is &lt;1.27.1-15.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512623" version="1" comment="tar-lang is &lt;1.27.1-15.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141587" version="1" comment="libpolkit0 is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141588" version="1" comment="libpolkit0-32bit is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141589" version="1" comment="polkit is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141590" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115371" version="1" comment="libpolkit0 is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115372" version="1" comment="libpolkit0-32bit is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115373" version="1" comment="polkit is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115376" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140902" version="1" comment="libpolkit0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142141" version="1" comment="libpolkit0-32bit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140903" version="1" comment="polkit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140904" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512381" version="1" comment="libpolkit0 is &lt;0.113-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512382" version="1" comment="libpolkit0-32bit is &lt;0.113-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512383" version="1" comment="polkit is &lt;0.113-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512384" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141810" version="1" comment="sudo is &lt;1.8.10p3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141130" version="1" comment="sudo is &lt;1.8.10p3-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159307" version="1" comment="sudo is &lt;1.8.20p2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512620" version="1" comment="sudo is &lt;1.8.20p2-3.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140539" version="1" comment="dbus-1-glib is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140540" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141583" version="1" comment="libpng12-0 is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141584" version="1" comment="libpng12-0-32bit is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141585" version="1" comment="libpng16-16 is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141586" version="1" comment="libpng16-16-32bit is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142005" version="1" comment="libpng15-15 is &lt;1.5.22-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105438" version="1" comment="libpng16-16 is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105439" version="1" comment="libpng16-16-32bit is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119221" version="1" comment="libpng12-0 is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119222" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119233" version="1" comment="libpng15-15 is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119224" version="1" comment="libpng16-16 is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119225" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149999" version="1" comment="libpng12-0 is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150000" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150810" version="1" comment="libpng15-15 is &lt;1.5.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149948" version="1" comment="libpng16-16 is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149949" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141825" version="1" comment="w3m is &lt;0.5.3-153.145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141157" version="1" comment="w3m is &lt;0.5.3-157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136644" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141837" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141838" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142069" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142070" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141173" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141174" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157352" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157353" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512635" version="1" comment="xorg-x11-server is &lt;1.19.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512636" version="1" comment="xorg-x11-server-extra is &lt;1.19.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141705" version="1" comment="libvirt is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141706" version="1" comment="libvirt-client is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141707" version="1" comment="libvirt-client-32bit is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141708" version="1" comment="libvirt-daemon is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141709" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141710" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141711" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141712" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141713" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141714" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141715" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141716" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141717" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141718" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141719" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141720" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141721" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141722" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141723" version="1" comment="libvirt-doc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142018" version="1" comment="libvirt is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142019" version="1" comment="libvirt-client is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142020" version="1" comment="libvirt-client-32bit is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142021" version="1" comment="libvirt-daemon is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142022" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142023" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142024" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142025" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142026" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142027" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142028" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142029" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142030" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142031" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142032" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142033" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142034" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142035" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142036" version="1" comment="libvirt-doc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140977" version="1" comment="libvirt is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140978" version="1" comment="libvirt-client is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142146" version="1" comment="libvirt-client-32bit is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140979" version="1" comment="libvirt-daemon is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140980" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140981" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140982" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140983" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140984" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140985" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140986" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140987" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140988" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140989" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140990" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140991" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140992" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140993" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140994" version="1" comment="libvirt-doc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159218" version="1" comment="libvirt is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159219" version="1" comment="libvirt-admin is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159220" version="1" comment="libvirt-client is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159221" version="1" comment="libvirt-daemon is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159222" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159223" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159224" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159225" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159226" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159227" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159228" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159229" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159230" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159231" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159232" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159233" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159234" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159235" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159236" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159237" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159238" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159239" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159240" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159241" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159242" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159243" version="1" comment="libvirt-doc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159244" version="1" comment="libvirt-libs is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512500" version="1" comment="libvirt is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512501" version="1" comment="libvirt-admin is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512502" version="1" comment="libvirt-client is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512503" version="1" comment="libvirt-daemon is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512504" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512505" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512506" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512507" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512508" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512509" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512510" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512511" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512512" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512513" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512514" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512515" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512516" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512517" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512518" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512519" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512520" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512521" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512522" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512523" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512524" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512525" version="1" comment="libvirt-doc is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512526" version="1" comment="libvirt-libs is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141826" version="1" comment="wget is &lt;1.14-4.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102008" version="1" comment="wget is &lt;1.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131037" version="1" comment="wget is &lt;1.14-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149815" version="1" comment="wget is &lt;1.14-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177348" version="1" comment="wget is &lt;1.14-21.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141230" version="1" comment="bogofilter is &lt;1.2.4-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131108" version="1" comment="bogofilter is &lt;1.2.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141042" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140686" version="1" comment="iputils is &lt;s20121221-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141412" version="1" comment="gpg2 is &lt;2.0.24-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141413" version="1" comment="gpg2-lang is &lt;2.0.24-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119616" version="1" comment="gpg2 is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119617" version="1" comment="gpg2-lang is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159008" version="1" comment="gpg2 is &lt;2.0.24-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159009" version="1" comment="gpg2-lang is &lt;2.0.24-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512180" version="1" comment="gpg2 is &lt;2.0.24-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512181" version="1" comment="gpg2-lang is &lt;2.0.24-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141319" version="1" comment="evince is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141320" version="1" comment="evince-lang is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141321" version="1" comment="libevdocument3-4 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141322" version="1" comment="libevview3-3 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141323" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141324" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140557" version="1" comment="evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140558" version="1" comment="evince-browser-plugin is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140559" version="1" comment="evince-lang is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140560" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140561" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140562" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140563" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140564" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140565" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140566" version="1" comment="libevdocument3-4 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140567" version="1" comment="libevview3-3 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140568" version="1" comment="nautilus-evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142092" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142093" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174438" version="1" comment="evince is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174439" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174440" version="1" comment="evince-lang is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174441" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174442" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174443" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174444" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174445" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174446" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174447" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174448" version="1" comment="libevview3-3 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174449" version="1" comment="nautilus-evince is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174450" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174451" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141769" version="1" comment="perl is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141770" version="1" comment="perl-32bit is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141771" version="1" comment="perl-base is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141772" version="1" comment="perl-doc is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131038" version="1" comment="perl is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131039" version="1" comment="perl-32bit is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131040" version="1" comment="perl-base is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131041" version="1" comment="perl-doc is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512589" version="1" comment="perl is &lt;5.18.2-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512590" version="1" comment="perl-32bit is &lt;5.18.2-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512591" version="1" comment="perl-base is &lt;5.18.2-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512592" version="1" comment="perl-doc is &lt;5.18.2-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141564" version="1" comment="libmspack0 is &lt;0.4-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107709" version="1" comment="libmspack0 is &lt;0.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118765" version="1" comment="libmspack0 is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140932" version="1" comment="libsmi is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140933" version="1" comment="libsmi2 is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141630" version="1" comment="libreoffice is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141631" version="1" comment="libreoffice-base is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141632" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141633" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141634" version="1" comment="libreoffice-calc is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141635" version="1" comment="libreoffice-calc-extensions is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141636" version="1" comment="libreoffice-draw is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141637" version="1" comment="libreoffice-filters-optional is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141638" version="1" comment="libreoffice-gnome is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141639" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141640" version="1" comment="libreoffice-impress is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141641" version="1" comment="libreoffice-l10n-af is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141642" version="1" comment="libreoffice-l10n-ar is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141643" version="1" comment="libreoffice-l10n-ca is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141644" version="1" comment="libreoffice-l10n-cs is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141645" version="1" comment="libreoffice-l10n-da is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141646" version="1" comment="libreoffice-l10n-de is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141647" version="1" comment="libreoffice-l10n-en is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141648" version="1" comment="libreoffice-l10n-es is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141649" version="1" comment="libreoffice-l10n-fi is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141650" version="1" comment="libreoffice-l10n-fr is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141651" version="1" comment="libreoffice-l10n-gu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141652" version="1" comment="libreoffice-l10n-hi is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141653" version="1" comment="libreoffice-l10n-hu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141654" version="1" comment="libreoffice-l10n-it is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141655" version="1" comment="libreoffice-l10n-ja is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141656" version="1" comment="libreoffice-l10n-ko is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141657" version="1" comment="libreoffice-l10n-nb is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141658" version="1" comment="libreoffice-l10n-nl is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141659" version="1" comment="libreoffice-l10n-nn is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141660" version="1" comment="libreoffice-l10n-pl is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141661" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141662" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141663" version="1" comment="libreoffice-l10n-ru is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141664" version="1" comment="libreoffice-l10n-sk is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141665" version="1" comment="libreoffice-l10n-sv is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141666" version="1" comment="libreoffice-l10n-xh is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141667" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141668" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141669" version="1" comment="libreoffice-l10n-zu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141670" version="1" comment="libreoffice-mailmerge is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141671" version="1" comment="libreoffice-math is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141672" version="1" comment="libreoffice-officebean is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141673" version="1" comment="libreoffice-pyuno is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141674" version="1" comment="libreoffice-writer is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141675" version="1" comment="libreoffice-writer-extensions is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115661" version="1" comment="libreoffice is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115662" version="1" comment="libreoffice-base is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115663" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115664" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115666" version="1" comment="libreoffice-calc is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115667" version="1" comment="libreoffice-calc-extensions is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115668" version="1" comment="libreoffice-draw is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115669" version="1" comment="libreoffice-filters-optional is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115670" version="1" comment="libreoffice-gnome is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115677" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115678" version="1" comment="libreoffice-impress is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115680" version="1" comment="libreoffice-l10n-af is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115681" version="1" comment="libreoffice-l10n-ar is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115686" version="1" comment="libreoffice-l10n-ca is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115687" version="1" comment="libreoffice-l10n-cs is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115689" version="1" comment="libreoffice-l10n-da is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115690" version="1" comment="libreoffice-l10n-de is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115693" version="1" comment="libreoffice-l10n-en is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115694" version="1" comment="libreoffice-l10n-es is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115698" version="1" comment="libreoffice-l10n-fi is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115699" version="1" comment="libreoffice-l10n-fr is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115702" version="1" comment="libreoffice-l10n-gu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115704" version="1" comment="libreoffice-l10n-hi is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115706" version="1" comment="libreoffice-l10n-hu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115707" version="1" comment="libreoffice-l10n-it is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115708" version="1" comment="libreoffice-l10n-ja is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115711" version="1" comment="libreoffice-l10n-ko is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115717" version="1" comment="libreoffice-l10n-nb is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115718" version="1" comment="libreoffice-l10n-nl is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115719" version="1" comment="libreoffice-l10n-nn is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115724" version="1" comment="libreoffice-l10n-pl is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115725" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115726" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115728" version="1" comment="libreoffice-l10n-ru is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115730" version="1" comment="libreoffice-l10n-sk is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115735" version="1" comment="libreoffice-l10n-sv is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115744" version="1" comment="libreoffice-l10n-xh is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115745" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115746" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115747" version="1" comment="libreoffice-l10n-zu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115748" version="1" comment="libreoffice-mailmerge is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115749" version="1" comment="libreoffice-math is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115750" version="1" comment="libreoffice-officebean is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115751" version="1" comment="libreoffice-pyuno is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115754" version="1" comment="libreoffice-writer is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115755" version="1" comment="libreoffice-writer-extensions is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130948" version="1" comment="libreoffice is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131150" version="1" comment="libreoffice-base is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131151" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131152" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131153" version="1" comment="libreoffice-calc is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131154" version="1" comment="libreoffice-calc-extensions is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131155" version="1" comment="libreoffice-draw is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131156" version="1" comment="libreoffice-filters-optional is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131157" version="1" comment="libreoffice-gnome is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131158" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131159" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131160" version="1" comment="libreoffice-impress is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131161" version="1" comment="libreoffice-l10n-af is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131162" version="1" comment="libreoffice-l10n-ar is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131163" version="1" comment="libreoffice-l10n-ca is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131164" version="1" comment="libreoffice-l10n-cs is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131165" version="1" comment="libreoffice-l10n-da is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131166" version="1" comment="libreoffice-l10n-de is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131167" version="1" comment="libreoffice-l10n-en is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131168" version="1" comment="libreoffice-l10n-es is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131169" version="1" comment="libreoffice-l10n-fi is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131170" version="1" comment="libreoffice-l10n-fr is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131171" version="1" comment="libreoffice-l10n-gu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131172" version="1" comment="libreoffice-l10n-hi is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131173" version="1" comment="libreoffice-l10n-hu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131174" version="1" comment="libreoffice-l10n-it is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131175" version="1" comment="libreoffice-l10n-ja is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131176" version="1" comment="libreoffice-l10n-ko is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131177" version="1" comment="libreoffice-l10n-nb is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131178" version="1" comment="libreoffice-l10n-nl is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131179" version="1" comment="libreoffice-l10n-nn is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131180" version="1" comment="libreoffice-l10n-pl is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131181" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131182" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142143" version="1" comment="libreoffice-l10n-ro is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131183" version="1" comment="libreoffice-l10n-ru is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131184" version="1" comment="libreoffice-l10n-sk is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131185" version="1" comment="libreoffice-l10n-sv is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131186" version="1" comment="libreoffice-l10n-xh is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131187" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131188" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131189" version="1" comment="libreoffice-l10n-zu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131190" version="1" comment="libreoffice-mailmerge is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131191" version="1" comment="libreoffice-math is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131192" version="1" comment="libreoffice-officebean is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131193" version="1" comment="libreoffice-pyuno is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131194" version="1" comment="libreoffice-writer is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131195" version="1" comment="libreoffice-writer-extensions is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142144" version="1" comment="libreofficekit is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159657" version="1" comment="libreoffice is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159658" version="1" comment="libreoffice-base is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159659" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159660" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159661" version="1" comment="libreoffice-calc is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159662" version="1" comment="libreoffice-calc-extensions is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159663" version="1" comment="libreoffice-draw is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159664" version="1" comment="libreoffice-filters-optional is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159665" version="1" comment="libreoffice-gnome is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159666" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159667" version="1" comment="libreoffice-icon-theme-tango is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159668" version="1" comment="libreoffice-impress is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159669" version="1" comment="libreoffice-l10n-af is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159670" version="1" comment="libreoffice-l10n-ar is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159671" version="1" comment="libreoffice-l10n-ca is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159672" version="1" comment="libreoffice-l10n-cs is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159673" version="1" comment="libreoffice-l10n-da is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159674" version="1" comment="libreoffice-l10n-de is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159675" version="1" comment="libreoffice-l10n-en is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159676" version="1" comment="libreoffice-l10n-es is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159677" version="1" comment="libreoffice-l10n-fi is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159678" version="1" comment="libreoffice-l10n-fr is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159679" version="1" comment="libreoffice-l10n-gu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159680" version="1" comment="libreoffice-l10n-hi is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159681" version="1" comment="libreoffice-l10n-hu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159682" version="1" comment="libreoffice-l10n-it is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159683" version="1" comment="libreoffice-l10n-ja is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159684" version="1" comment="libreoffice-l10n-ko is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159685" version="1" comment="libreoffice-l10n-nb is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159686" version="1" comment="libreoffice-l10n-nl is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159687" version="1" comment="libreoffice-l10n-nn is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159688" version="1" comment="libreoffice-l10n-pl is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159689" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159690" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159691" version="1" comment="libreoffice-l10n-ro is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159692" version="1" comment="libreoffice-l10n-ru is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159693" version="1" comment="libreoffice-l10n-sk is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159694" version="1" comment="libreoffice-l10n-sv is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159695" version="1" comment="libreoffice-l10n-xh is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159696" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159697" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159698" version="1" comment="libreoffice-l10n-zu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159699" version="1" comment="libreoffice-mailmerge is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159700" version="1" comment="libreoffice-math is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159701" version="1" comment="libreoffice-officebean is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159702" version="1" comment="libreoffice-pyuno is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159703" version="1" comment="libreoffice-writer is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159704" version="1" comment="libreoffice-writer-extensions is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159705" version="1" comment="libreofficekit is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512416" version="1" comment="libreoffice is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512417" version="1" comment="libreoffice-base is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512418" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512419" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512420" version="1" comment="libreoffice-branding-upstream is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512421" version="1" comment="libreoffice-calc is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512422" version="1" comment="libreoffice-calc-extensions is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512423" version="1" comment="libreoffice-draw is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512424" version="1" comment="libreoffice-filters-optional is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512425" version="1" comment="libreoffice-gnome is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512426" version="1" comment="libreoffice-gtk2 is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512427" version="1" comment="libreoffice-icon-themes is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512428" version="1" comment="libreoffice-impress is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512429" version="1" comment="libreoffice-l10n-af is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512430" version="1" comment="libreoffice-l10n-ar is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512431" version="1" comment="libreoffice-l10n-ca is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512432" version="1" comment="libreoffice-l10n-cs is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512433" version="1" comment="libreoffice-l10n-da is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512434" version="1" comment="libreoffice-l10n-de is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512435" version="1" comment="libreoffice-l10n-en is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512436" version="1" comment="libreoffice-l10n-es is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512437" version="1" comment="libreoffice-l10n-fi is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512438" version="1" comment="libreoffice-l10n-fr is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512439" version="1" comment="libreoffice-l10n-gu is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512440" version="1" comment="libreoffice-l10n-hi is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512441" version="1" comment="libreoffice-l10n-hu is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512442" version="1" comment="libreoffice-l10n-it is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512443" version="1" comment="libreoffice-l10n-ja is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512444" version="1" comment="libreoffice-l10n-ko is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512445" version="1" comment="libreoffice-l10n-nb is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512446" version="1" comment="libreoffice-l10n-nl is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512447" version="1" comment="libreoffice-l10n-nn is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512448" version="1" comment="libreoffice-l10n-pl is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512449" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512450" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512451" version="1" comment="libreoffice-l10n-ro is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512452" version="1" comment="libreoffice-l10n-ru is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512453" version="1" comment="libreoffice-l10n-sk is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512454" version="1" comment="libreoffice-l10n-sv is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512455" version="1" comment="libreoffice-l10n-xh is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512456" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512457" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512458" version="1" comment="libreoffice-l10n-zu is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512459" version="1" comment="libreoffice-mailmerge is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512460" version="1" comment="libreoffice-math is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512461" version="1" comment="libreoffice-officebean is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512462" version="1" comment="libreoffice-pyuno is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512463" version="1" comment="libreoffice-writer is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512464" version="1" comment="libreoffice-writer-extensions is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140717" version="1" comment="libHX28 is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140718" version="1" comment="libHX28-32bit is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141510" version="1" comment="libfreebl3 is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141511" version="1" comment="libfreebl3-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141512" version="1" comment="libsoftokn3 is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141513" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141514" version="1" comment="mozilla-nss is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141515" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141516" version="1" comment="mozilla-nss-certs is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141517" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141518" version="1" comment="mozilla-nss-tools is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116018" version="1" comment="libfreebl3 is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116019" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116022" version="1" comment="libsoftokn3 is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116023" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116026" version="1" comment="mozilla-nss is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116027" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116029" version="1" comment="mozilla-nss-certs is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116030" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116032" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116033" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116034" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129282" version="1" comment="libfreebl3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129283" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129284" version="1" comment="libsoftokn3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129285" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129288" version="1" comment="mozilla-nss is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129289" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129290" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129291" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129292" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129293" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129294" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155316" version="1" comment="libfreebl3 is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155317" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155318" version="1" comment="libsoftokn3 is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155319" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155322" version="1" comment="mozilla-nss is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155323" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155324" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155325" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155326" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155327" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155328" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512309" version="1" comment="libfreebl3 is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512310" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512311" version="1" comment="libsoftokn3 is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512312" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512313" version="1" comment="mozilla-nss is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512314" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512315" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512316" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512317" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512318" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512319" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141764" version="1" comment="pam is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141765" version="1" comment="pam-32bit is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141766" version="1" comment="pam-doc is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141056" version="1" comment="pam is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141057" version="1" comment="pam-32bit is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141058" version="1" comment="pam-doc is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155972" version="1" comment="pam is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155973" version="1" comment="pam-32bit is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155974" version="1" comment="pam-doc is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512585" version="1" comment="pam is &lt;1.1.8-24.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512586" version="1" comment="pam-32bit is &lt;1.1.8-24.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512587" version="1" comment="pam-doc is &lt;1.1.8-24.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141760" version="1" comment="openslp is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141761" version="1" comment="openslp-32bit is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142041" version="1" comment="openslp is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142042" version="1" comment="openslp-32bit is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131123" version="1" comment="openslp is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131124" version="1" comment="openslp-32bit is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131298" version="1" comment="openslp is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131299" version="1" comment="openslp-32bit is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512581" version="1" comment="openslp is &lt;2.0.0-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512582" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141405" version="1" comment="gnome-shell is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141406" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141407" version="1" comment="gnome-shell-calendar is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141408" version="1" comment="gnome-shell-lang is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141882" version="1" comment="gnome-shell is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141883" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141884" version="1" comment="gnome-shell-calendar is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141885" version="1" comment="gnome-shell-lang is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140640" version="1" comment="gnome-shell is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140641" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142112" version="1" comment="gnome-shell-calendar is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140642" version="1" comment="gnome-shell-lang is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159001" version="1" comment="gnome-shell is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159002" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159645" version="1" comment="gnome-shell-calendar is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159003" version="1" comment="gnome-shell-lang is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512168" version="1" comment="gnome-shell is &lt;3.20.4-77.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512169" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512170" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512171" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141537" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141538" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141539" version="1" comment="python-sssd-config is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141540" version="1" comment="sssd is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141541" version="1" comment="sssd-32bit is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141542" version="1" comment="sssd-ad is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141543" version="1" comment="sssd-ipa is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141544" version="1" comment="sssd-krb5 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141545" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141546" version="1" comment="sssd-ldap is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141547" version="1" comment="sssd-proxy is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141548" version="1" comment="sssd-tools is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141980" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141981" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141982" version="1" comment="libsss_sudo is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141983" version="1" comment="python-sssd-config is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141984" version="1" comment="sssd is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141985" version="1" comment="sssd-32bit is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141986" version="1" comment="sssd-ad is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141987" version="1" comment="sssd-ipa is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141988" version="1" comment="sssd-krb5 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141989" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141990" version="1" comment="sssd-ldap is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141991" version="1" comment="sssd-proxy is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141992" version="1" comment="sssd-tools is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140848" version="1" comment="libipa_hbac0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140849" version="1" comment="libsss_idmap0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140850" version="1" comment="libsss_sudo is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140851" version="1" comment="python-sssd-config is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140852" version="1" comment="sssd is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140853" version="1" comment="sssd-32bit is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140854" version="1" comment="sssd-ad is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140855" version="1" comment="sssd-ipa is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140856" version="1" comment="sssd-krb5 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140857" version="1" comment="sssd-krb5-common is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140858" version="1" comment="sssd-ldap is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140859" version="1" comment="sssd-proxy is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140860" version="1" comment="sssd-tools is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159140" version="1" comment="libipa_hbac0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159141" version="1" comment="libsss_idmap0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159142" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159143" version="1" comment="libsss_sudo is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159144" version="1" comment="python-sssd-config is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159145" version="1" comment="sssd is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159146" version="1" comment="sssd-32bit is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159147" version="1" comment="sssd-ad is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159148" version="1" comment="sssd-ipa is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159149" version="1" comment="sssd-krb5 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159150" version="1" comment="sssd-krb5-common is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159151" version="1" comment="sssd-ldap is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159152" version="1" comment="sssd-proxy is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159153" version="1" comment="sssd-tools is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512322" version="1" comment="libipa_hbac0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512323" version="1" comment="libsss_certmap0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512324" version="1" comment="libsss_idmap0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512325" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512326" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166514" version="1" comment="libsss_sudo is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512327" version="1" comment="python-sssd-config is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512328" version="1" comment="sssd is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512329" version="1" comment="sssd-32bit is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512330" version="1" comment="sssd-ad is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512331" version="1" comment="sssd-ipa is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512332" version="1" comment="sssd-krb5 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512333" version="1" comment="sssd-krb5-common is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512334" version="1" comment="sssd-ldap is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512335" version="1" comment="sssd-proxy is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512336" version="1" comment="sssd-tools is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141293" version="1" comment="dbus-1 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141294" version="1" comment="dbus-1-x11 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141295" version="1" comment="libdbus-1-3 is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141296" version="1" comment="libdbus-1-3-32bit is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107559" version="1" comment="dbus-1 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107561" version="1" comment="dbus-1-x11 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107564" version="1" comment="libdbus-1-3 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107565" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140535" version="1" comment="dbus-1 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140536" version="1" comment="dbus-1-x11 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140537" version="1" comment="libdbus-1-3 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140538" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158960" version="1" comment="dbus-1 is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158961" version="1" comment="dbus-1-x11 is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158962" version="1" comment="libdbus-1-3 is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158963" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512109" version="1" comment="dbus-1 is &lt;1.8.22-29.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512110" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512111" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512112" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141065" version="1" comment="pcsc-ccid is &lt;1.4.14-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159258" version="1" comment="pcsc-ccid is &lt;1.4.25-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141368" version="1" comment="gimp is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141369" version="1" comment="gimp-lang is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141370" version="1" comment="gimp-plugins-python is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141371" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141372" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142102" version="1" comment="gimp is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142103" version="1" comment="gimp-lang is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142104" version="1" comment="gimp-plugins-python is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142105" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142106" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141768" version="1" comment="patch is &lt;2.7.1-5.191" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110205" version="1" comment="patch is &lt;2.7.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175223" version="1" comment="patch is &lt;2.7.5-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514658" version="1" comment="libmysqlclient18 is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514659" version="1" comment="libmysqlclient18-32bit is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514660" version="1" comment="libmysqlclient_r18 is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514661" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514662" version="1" comment="mariadb is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514663" version="1" comment="mariadb-client is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514664" version="1" comment="mariadb-errormessages is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338824" version="1" comment="cups-filters is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141577" version="1" comment="libpango-1_0-0 is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141578" version="1" comment="libpango-1_0-0-32bit is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141579" version="1" comment="pango-modules is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141580" version="1" comment="pango-modules-32bit is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141581" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140897" version="1" comment="libpango-1_0-0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140898" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140899" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141753" version="1" comment="libzip2 is &lt;0.11.1-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142037" version="1" comment="libzip2 is &lt;0.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141037" version="1" comment="libzip2 is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164531" version="1" comment="libzip2 is &lt;0.11.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141422" version="1" comment="kbd is &lt;1.15.5-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141890" version="1" comment="kbd is &lt;1.15.5-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140693" version="1" comment="kbd is &lt;1.15.5-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512194" version="1" comment="kbd is &lt;2.0.4-8.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512195" version="1" comment="kbd-legacy is &lt;2.0.4-8.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141203" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141204" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141841" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141842" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140437" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140438" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158923" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158924" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512023" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512024" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141834" version="1" comment="xorg-x11 is &lt;7.6_1-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141835" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141171" version="1" comment="xrdb is &lt;1.1.0-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140676" version="1" comment="libgypsy0 is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141821" version="1" comment="vino is &lt;3.10.1-1.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141822" version="1" comment="vino-lang is &lt;3.10.1-1.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141154" version="1" comment="vino is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141155" version="1" comment="vino-lang is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141814" version="1" comment="telepathy-gabble is &lt;0.18.1-3.268" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142152" version="1" comment="telepathy-gabble is &lt;0.18.3-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141456" version="1" comment="libcgroup1 is &lt;0.41.rc1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140793" version="1" comment="libcgroup1 is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159084" version="1" comment="libcgroup1 is &lt;0.41.rc1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141801" version="1" comment="rsync is &lt;3.1.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141111" version="1" comment="rsync is &lt;3.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512616" version="1" comment="rsync is &lt;3.1.0-13.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141038" version="1" comment="logrotate is &lt;3.8.7-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159250" version="1" comment="logrotate is &lt;3.11.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512572" version="1" comment="logrotate is &lt;3.11.0-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141819" version="1" comment="unixODBC is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141820" version="1" comment="unixODBC-32bit is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141151" version="1" comment="unixODBC is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141152" version="1" comment="unixODBC-32bit is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512626" version="1" comment="unixODBC is &lt;2.3.6-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512627" version="1" comment="unixODBC-32bit is &lt;2.3.6-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333979" version="1" comment="rsyslog is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141605" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141606" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141607" version="1" comment="python-base is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141608" version="1" comment="python-devel is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141609" version="1" comment="python-xml is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142006" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142007" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142008" version="1" comment="python-base is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142009" version="1" comment="python-devel is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142010" version="1" comment="python-xml is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130996" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130997" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130999" version="1" comment="python-base is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131001" version="1" comment="python-devel is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131003" version="1" comment="python-xml is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159186" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159187" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159188" version="1" comment="python-base is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159656" version="1" comment="python-devel is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159190" version="1" comment="python-xml is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512391" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512392" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512393" version="1" comment="python-base is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512394" version="1" comment="python-devel is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512395" version="1" comment="python-xml is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140711" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141362" version="1" comment="gdm is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141363" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141364" version="1" comment="gdm-lang is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141365" version="1" comment="gdmflexiserver is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141366" version="1" comment="libgdm1 is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141367" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141862" version="1" comment="gdm is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141863" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141864" version="1" comment="gdm-lang is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141865" version="1" comment="gdmflexiserver is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141866" version="1" comment="libgdm1 is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141867" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140601" version="1" comment="gdm is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140602" version="1" comment="gdm-lang is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140603" version="1" comment="gdmflexiserver is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140604" version="1" comment="libgdm1 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140605" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512145" version="1" comment="gdm is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512146" version="1" comment="gdm-lang is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512147" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512148" version="1" comment="libgdm1 is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512149" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140885" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177725" version="1" comment="libmodplug1 is &lt;0.8.9.0+git20170610.f6dd59a-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338710" version="1" comment="ekiga is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141302" version="1" comment="ecryptfs-utils is &lt;103-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141303" version="1" comment="ecryptfs-utils-32bit is &lt;103-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121566" version="1" comment="ecryptfs-utils is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121567" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170839" version="1" comment="ecryptfs-utils is &lt;103-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170840" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141829" version="1" comment="xen is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141830" version="1" comment="xen-kmp-default is &lt;4.4.1_06_k3.12.28_4-2.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141831" version="1" comment="xen-libs is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141832" version="1" comment="xen-libs-32bit is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142064" version="1" comment="xen is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142065" version="1" comment="xen-kmp-default is &lt;4.5.1_12_k3.12.49_11-2.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142066" version="1" comment="xen-libs is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142067" version="1" comment="xen-libs-32bit is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141159" version="1" comment="xen is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141161" version="1" comment="xen-libs is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141162" version="1" comment="xen-libs-32bit is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159317" version="1" comment="xen is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159319" version="1" comment="xen-libs is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159320" version="1" comment="xen-libs-32bit is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512629" version="1" comment="xen is &lt;4.11.0_08-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512630" version="1" comment="xen-libs is &lt;4.11.0_08-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512631" version="1" comment="xen-libs-32bit is &lt;4.11.0_08-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141524" version="1" comment="libgnomesu is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141525" version="1" comment="libgnomesu-lang is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141526" version="1" comment="libgnomesu0 is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140842" version="1" comment="libgnomesu is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140843" version="1" comment="libgnomesu-lang is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140844" version="1" comment="libgnomesu0 is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141687" version="1" comment="libsoup-2_4-1 is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141688" version="1" comment="libsoup-2_4-1-32bit is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141689" version="1" comment="libsoup-lang is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141690" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140939" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140940" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140941" version="1" comment="libsoup-lang is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140942" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512472" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512473" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512474" version="1" comment="libsoup-lang is &lt;2.62.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512475" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141816" version="1" comment="tftp is &lt;5.2-8.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141141" version="1" comment="tftp is &lt;5.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512624" version="1" comment="tftp is &lt;5.2-11.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141813" version="1" comment="sysvinit-tools is &lt;2.88+-94.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141139" version="1" comment="whois is &lt;5.1.1-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141840" version="1" comment="yast2-core is &lt;3.1.11-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142072" version="1" comment="yast2-core is &lt;3.1.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141138" version="1" comment="sysvinit-tools is &lt;2.88+-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141176" version="1" comment="yast2-core is &lt;3.1.23-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159312" version="1" comment="sysvinit-tools is &lt;2.88+-99.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159326" version="1" comment="yast2-core is &lt;3.2.2-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512638" version="1" comment="yast2-core is &lt;3.3.1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141352" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141353" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141354" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141355" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141356" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141357" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140591" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140592" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140593" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140594" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140595" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140596" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158993" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158994" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158995" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158996" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158997" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158998" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512139" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512140" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512141" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512142" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512143" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512144" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141421" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.5.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114769" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141887" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.1-2.4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159646" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.2-2.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159647" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.2-2.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140845" version="1" comment="libgssglue1 is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140846" version="1" comment="libgssglue1-32bit is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333940" version="1" comment="samba is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141437" version="1" comment="libXfont1 is &lt;1.4.7-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141836" version="1" comment="xorg-x11-libs is &lt;7.6-45.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108654" version="1" comment="libXfont1 is &lt;1.4.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140752" version="1" comment="libXfont1 is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170838" version="1" comment="libXfont1 is &lt;1.5.1-11.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141358" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141359" version="1" comment="librsvg-2-2 is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141360" version="1" comment="librsvg-2-2-32bit is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141361" version="1" comment="rsvg-view is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140597" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140598" version="1" comment="librsvg-2-2 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140599" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140600" version="1" comment="rsvg-view is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175785" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.20-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175787" version="1" comment="librsvg-2-2 is &lt;2.40.20-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175788" version="1" comment="librsvg-2-2-32bit is &lt;2.40.20-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175789" version="1" comment="rsvg-view is &lt;2.40.20-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141767" version="1" comment="pam-modules is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141060" version="1" comment="pam-modules-32bit is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141839" version="1" comment="yast2 is &lt;3.1.108-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142071" version="1" comment="yast2 is &lt;3.1.155-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141175" version="1" comment="yast2 is &lt;3.1.206-37.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159325" version="1" comment="yast2 is &lt;3.2.36-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512637" version="1" comment="yast2 is &lt;3.2.48-3.29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141802" version="1" comment="rsyslog is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142058" version="1" comment="rsyslog is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141112" version="1" comment="rsyslog is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159295" version="1" comment="rsyslog is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512617" version="1" comment="rsyslog is &lt;8.24.0-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141610" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141611" version="1" comment="python3-base is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140926" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140927" version="1" comment="python3-base is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159191" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159192" version="1" comment="python3-base is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512396" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512397" version="1" comment="python3-base is &lt;3.4.6-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141419" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141420" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115439" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115443" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130960" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130961" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155970" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155971" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512190" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512191" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141103" version="1" comment="radvd is &lt;1.9.7-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140678" version="1" comment="hardlink is &lt;1.0-6.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141316" version="1" comment="empathy is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141317" version="1" comment="empathy-lang is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141318" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142089" version="1" comment="empathy is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142090" version="1" comment="empathy-lang is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142091" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159630" version="1" comment="empathy is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159631" version="1" comment="empathy-lang is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159632" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512118" version="1" comment="empathy is &lt;3.12.13-8.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512119" version="1" comment="empathy-lang is &lt;3.12.13-8.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512120" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.13-8.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141776" version="1" comment="puppet is &lt;3.6.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142149" version="1" comment="puppet is &lt;3.8.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159708" version="1" comment="puppet is &lt;3.8.5-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172606" version="1" comment="puppet is &lt;3.8.5-15.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141811" version="1" comment="sysconfig is &lt;0.83.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141812" version="1" comment="sysconfig-netconfig is &lt;0.83.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142060" version="1" comment="sysconfig is &lt;0.83.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142061" version="1" comment="sysconfig-netconfig is &lt;0.83.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141132" version="1" comment="sysconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141133" version="1" comment="sysconfig-netconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141236" version="1" comment="colord is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141237" version="1" comment="colord-gtk-lang is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141238" version="1" comment="colord-lang is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141239" version="1" comment="libcolord-gtk1 is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141240" version="1" comment="libcolord2 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141241" version="1" comment="libcolord2-32bit is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141242" version="1" comment="libcolorhug2 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141852" version="1" comment="colord is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141853" version="1" comment="colord-lang is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141854" version="1" comment="libcolord2 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141855" version="1" comment="libcolord2-32bit is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141856" version="1" comment="libcolorhug2 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142079" version="1" comment="colord is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140490" version="1" comment="colord-gtk-lang is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142080" version="1" comment="colord-lang is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140491" version="1" comment="libcolord-gtk1 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140492" version="1" comment="libcolord2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140493" version="1" comment="libcolord2-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140494" version="1" comment="libcolorhug2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159627" version="1" comment="colord is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159628" version="1" comment="colord-lang is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158945" version="1" comment="libcolord2 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158946" version="1" comment="libcolord2-32bit is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158947" version="1" comment="libcolorhug2 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141781" version="1" comment="python-cupshelpers is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141782" version="1" comment="system-config-printer is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141783" version="1" comment="system-config-printer-common is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141784" version="1" comment="system-config-printer-common-lang is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141785" version="1" comment="system-config-printer-dbus-service is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141786" version="1" comment="udev-configure-printer is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141076" version="1" comment="python-cupshelpers is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141077" version="1" comment="system-config-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141078" version="1" comment="system-config-printer-common is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141079" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141080" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141081" version="1" comment="udev-configure-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141312" version="1" comment="emacs is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141313" version="1" comment="emacs-info is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141314" version="1" comment="emacs-x11 is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141315" version="1" comment="etags is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140549" version="1" comment="emacs is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140551" version="1" comment="emacs-info is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140553" version="1" comment="emacs-x11 is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140554" version="1" comment="etags is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158975" version="1" comment="emacs is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158977" version="1" comment="emacs-info is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158979" version="1" comment="emacs-x11 is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158980" version="1" comment="etags is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164489" version="1" comment="emacs is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164490" version="1" comment="emacs-info is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164491" version="1" comment="emacs-x11 is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164492" version="1" comment="etags is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140928" version="1" comment="libraptor2-0 is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141628" version="1" comment="raptor is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141196" version="1" comment="ImageMagick is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141197" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141198" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141199" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141200" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102628" version="1" comment="ImageMagick is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102634" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102638" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102637" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102640" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130983" version="1" comment="ImageMagick is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130984" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130985" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130986" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130987" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156374" version="1" comment="ImageMagick is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156375" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156376" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156377" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156378" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512006" version="1" comment="ImageMagick is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512007" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512008" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512009" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512010" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141442" version="1" comment="libaugeas0 is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111372" version="1" comment="libaugeas0 is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140461" version="1" comment="augeas is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140462" version="1" comment="augeas-lenses is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140463" version="1" comment="libaugeas0 is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158941" version="1" comment="augeas is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158942" version="1" comment="augeas-lenses is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158943" version="1" comment="libaugeas0 is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172798" version="1" comment="augeas is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172799" version="1" comment="augeas-lenses is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172800" version="1" comment="libaugeas0 is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140516" version="1" comment="cvs is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163575" version="1" comment="cvs is &lt;1.12.12-182.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141167" version="1" comment="xinetd is &lt;2.3.15-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512634" version="1" comment="xinetd is &lt;2.3.15-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522652" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522653" version="1" comment="python3 is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522654" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522655" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333953" version="1" comment="krb5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141773" version="1" comment="perl-YAML-LibYAML is &lt;0.38-7.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109959" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141527" version="1" comment="libgudev-1_0-0 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141528" version="1" comment="libgudev-1_0-0-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141529" version="1" comment="libudev1 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141530" version="1" comment="libudev1-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141531" version="1" comment="systemd is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141532" version="1" comment="systemd-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141533" version="1" comment="systemd-bash-completion is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141534" version="1" comment="systemd-sysvinit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141535" version="1" comment="udev is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141971" version="1" comment="libgudev-1_0-0 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141972" version="1" comment="libgudev-1_0-0-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141973" version="1" comment="libudev1 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141974" version="1" comment="libudev1-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141975" version="1" comment="systemd is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141976" version="1" comment="systemd-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141977" version="1" comment="systemd-bash-completion is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141978" version="1" comment="systemd-sysvinit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141979" version="1" comment="udev is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140954" version="1" comment="libsystemd0 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140955" version="1" comment="libsystemd0-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140956" version="1" comment="libudev1 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140957" version="1" comment="libudev1-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140958" version="1" comment="systemd is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140959" version="1" comment="systemd-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140960" version="1" comment="systemd-bash-completion is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140961" version="1" comment="systemd-sysvinit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140962" version="1" comment="udev is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159206" version="1" comment="libsystemd0 is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159207" version="1" comment="libsystemd0-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159208" version="1" comment="libudev1 is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159209" version="1" comment="libudev1-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159210" version="1" comment="systemd is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159211" version="1" comment="systemd-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159212" version="1" comment="systemd-bash-completion is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159213" version="1" comment="systemd-sysvinit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159214" version="1" comment="udev is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512486" version="1" comment="libsystemd0 is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512487" version="1" comment="libsystemd0-32bit is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512488" version="1" comment="libudev1 is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512489" version="1" comment="libudev1-32bit is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512490" version="1" comment="systemd is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512491" version="1" comment="systemd-32bit is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512492" version="1" comment="systemd-bash-completion is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512493" version="1" comment="systemd-sysvinit is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512494" version="1" comment="udev is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141330" version="1" comment="file is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141331" version="1" comment="file-magic is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141332" version="1" comment="libmagic1 is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141333" version="1" comment="libmagic1-32bit is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103557" version="1" comment="file is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103559" version="1" comment="file-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103561" version="1" comment="libmagic1 is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103560" version="1" comment="libmagic1-32bit is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512122" version="1" comment="file is &lt;5.22-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512123" version="1" comment="file-magic is &lt;5.22-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512124" version="1" comment="libmagic1 is &lt;5.22-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512125" version="1" comment="libmagic1-32bit is &lt;5.22-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141211" version="1" comment="argyllcms is &lt;1.6.3-1.179" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142077" version="1" comment="argyllcms is &lt;1.6.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141682" version="1" comment="libsnmp30 is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141683" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141684" version="1" comment="net-snmp is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141685" version="1" comment="perl-SNMP is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141686" version="1" comment="snmp-mibs is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140934" version="1" comment="libsnmp30 is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140935" version="1" comment="libsnmp30-32bit is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140936" version="1" comment="net-snmp is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140937" version="1" comment="perl-SNMP is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140938" version="1" comment="snmp-mibs is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512467" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512468" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512469" version="1" comment="net-snmp is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512470" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512471" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334136" version="1" comment="evince is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514545" version="1" comment="xfsprogs is &lt;3.2.1-3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141166" version="1" comment="xfsprogs is &lt;4.3.0-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159324" version="1" comment="xfsprogs is &lt;4.3.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512633" version="1" comment="xfsprogs is &lt;4.15.0-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141774" version="1" comment="pidgin-otr is &lt;4.0.0-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142148" version="1" comment="pidgin-otr is &lt;4.0.0-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159707" version="1" comment="pidgin-plugin-otr is &lt;4.0.2-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140963" version="1" comment="libtag1 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141698" version="1" comment="libtag1-32bit is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140964" version="1" comment="libtag_c0 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141699" version="1" comment="libtag_c0-32bit is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140965" version="1" comment="taglib is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141066" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141886" version="1" comment="hyper-v is &lt;6-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140682" version="1" comment="hyper-v is &lt;7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512189" version="1" comment="hyper-v is &lt;7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140590" version="1" comment="libgc1 is &lt;7.2d-3.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136646" version="1" comment="libgc1 is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141205" version="1" comment="accountsservice is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141206" version="1" comment="accountsservice-lang is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141207" version="1" comment="libaccountsservice0 is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141208" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141843" version="1" comment="accountsservice is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141844" version="1" comment="accountsservice-lang is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141845" version="1" comment="libaccountsservice0 is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141846" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140439" version="1" comment="accountsservice is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140440" version="1" comment="accountsservice-lang is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140441" version="1" comment="libaccountsservice0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140442" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512025" version="1" comment="accountsservice is &lt;0.6.42-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512026" version="1" comment="accountsservice-lang is &lt;0.6.42-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512027" version="1" comment="libaccountsservice0 is &lt;0.6.42-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512028" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141727" version="1" comment="libvte9 is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141004" version="1" comment="libvte9 is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140840" version="1" comment="libexif12 is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140841" version="1" comment="libexif12-32bit is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170040" version="1" comment="libexif12 is &lt;0.6.21-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170041" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512579" version="1" comment="openconnect is &lt;7.08-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512580" version="1" comment="openconnect-lang is &lt;7.08-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141799" version="1" comment="rhythmbox is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141800" version="1" comment="rhythmbox-lang is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142150" version="1" comment="rhythmbox is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142151" version="1" comment="rhythmbox-lang is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140672" version="1" comment="wdiff is &lt;1.2.1-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141394" version="1" comment="gnome-keyring is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141395" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141396" version="1" comment="gnome-keyring-lang is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141397" version="1" comment="gnome-keyring-pam is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141398" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141399" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141876" version="1" comment="gnome-keyring is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141877" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141878" version="1" comment="gnome-keyring-lang is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141879" version="1" comment="gnome-keyring-pam is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141880" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141881" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140630" version="1" comment="gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140631" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140632" version="1" comment="gnome-keyring-lang is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140633" version="1" comment="gnome-keyring-pam is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140634" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140635" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512160" version="1" comment="gnome-keyring is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512161" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512162" version="1" comment="gnome-keyring-lang is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512163" version="1" comment="gnome-keyring-pam is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512164" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512165" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141805" version="1" comment="squashfs is &lt;4.3-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141126" version="1" comment="squashfs is &lt;4.3-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141691" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141692" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141693" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141694" version="1" comment="libspice-controller0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141695" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141696" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142011" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142012" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142013" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142014" version="1" comment="libspice-controller0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142015" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142016" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140943" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140944" version="1" comment="libspice-client-glib-helper is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140945" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140946" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140947" version="1" comment="libspice-controller0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140948" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140949" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159196" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159197" version="1" comment="libspice-client-glib-helper is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159198" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159199" version="1" comment="libspice-controller0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159200" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159201" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512476" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512477" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512478" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512479" version="1" comment="libspice-controller0 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512480" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512481" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517165" version="1" comment="gegl-0_2 is &lt;0.2.0-10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517166" version="1" comment="gegl-0_2-lang is &lt;0.2.0-10.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517167" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518486" version="1" comment="gegl-0_2 is &lt;0.2.0-14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518487" version="1" comment="gegl-0_2-lang is &lt;0.2.0-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518488" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149576" version="1" comment="gegl-0_2 is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149577" version="1" comment="gegl-0_2-lang is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149578" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141301" version="1" comment="dracut is &lt;037-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138243" version="1" comment="dracut is &lt;037-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140546" version="1" comment="dracut is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158969" version="1" comment="dracut is &lt;044-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512113" version="1" comment="dracut is &lt;044.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141595" version="1" comment="libproxy1 is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141596" version="1" comment="libproxy1-32bit is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141597" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141598" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141599" version="1" comment="libproxy1-networkmanager is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141600" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140909" version="1" comment="libproxy1 is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140910" version="1" comment="libproxy1-32bit is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140911" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140912" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140913" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142142" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140914" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140514" version="1" comment="cups-pk-helper is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140515" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138209" version="1" comment="cups-pk-helper is &lt;0.2.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138210" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338837" version="1" comment="xlockmore is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141697" version="1" comment="libssh4 is &lt;0.6.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114957" version="1" comment="libssh4 is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123868" version="1" comment="libssh4 is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512484" version="1" comment="libssh4 is &lt;0.6.3-12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512485" version="1" comment="libssh4-32bit is &lt;0.6.3-12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141549" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141550" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141551" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141552" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141553" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141554" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141555" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141556" version="1" comment="libwebkitgtk2-lang is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141557" version="1" comment="libwebkitgtk3-lang is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141558" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141559" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108618" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108619" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108628" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108630" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108620" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108621" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108631" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108623" version="1" comment="libwebkitgtk2-lang is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108634" version="1" comment="libwebkitgtk3-lang is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108635" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108636" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142131" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142132" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140862" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142133" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142134" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140863" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142135" version="1" comment="libwebkitgtk2-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140864" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142136" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142137" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514763" version="1" comment="cups is &lt;1.7.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514764" version="1" comment="cups-client is &lt;1.7.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514765" version="1" comment="cups-libs is &lt;1.7.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514766" version="1" comment="cups-libs-32bit is &lt;1.7.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517085" version="1" comment="expat is &lt;2.1.0-20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517086" version="1" comment="libexpat1 is &lt;2.1.0-20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517087" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519046" version="1" comment="clamav is &lt;0.99.4-33.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517671" version="1" comment="unrar is &lt;5.0.14-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157766" version="1" comment="unrar is &lt;5.0.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334330" version="1" comment="bash is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141443" version="1" comment="libblkid1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141444" version="1" comment="libblkid1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141445" version="1" comment="libmount1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141446" version="1" comment="libmount1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141447" version="1" comment="libsmartcols1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141448" version="1" comment="libuuid-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141449" version="1" comment="libuuid1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141450" version="1" comment="libuuid1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141451" version="1" comment="python-libmount is &lt;2.25-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141452" version="1" comment="util-linux is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141453" version="1" comment="util-linux-lang is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141454" version="1" comment="util-linux-systemd is &lt;2.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141455" version="1" comment="uuidd is &lt;2.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141904" version="1" comment="libblkid1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141905" version="1" comment="libblkid1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141906" version="1" comment="libmount1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141907" version="1" comment="libmount1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141908" version="1" comment="libsmartcols1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141909" version="1" comment="libuuid-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141910" version="1" comment="libuuid1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141911" version="1" comment="libuuid1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141912" version="1" comment="python-libmount is &lt;2.25-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141913" version="1" comment="util-linux is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141914" version="1" comment="util-linux-lang is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141915" version="1" comment="util-linux-systemd is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141916" version="1" comment="uuidd is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140779" version="1" comment="libblkid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140780" version="1" comment="libblkid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140781" version="1" comment="libfdisk1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140782" version="1" comment="libmount1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140783" version="1" comment="libmount1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140784" version="1" comment="libsmartcols1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142130" version="1" comment="libuuid-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140785" version="1" comment="libuuid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140786" version="1" comment="libuuid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140787" version="1" comment="python-libmount is &lt;2.28-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140788" version="1" comment="util-linux is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140789" version="1" comment="util-linux-lang is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140790" version="1" comment="util-linux-systemd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140791" version="1" comment="uuidd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159070" version="1" comment="libblkid1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159071" version="1" comment="libblkid1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159072" version="1" comment="libfdisk1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159073" version="1" comment="libmount1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159074" version="1" comment="libmount1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159075" version="1" comment="libsmartcols1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159649" version="1" comment="libuuid-devel is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159076" version="1" comment="libuuid1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159077" version="1" comment="libuuid1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159078" version="1" comment="python-libmount is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159079" version="1" comment="util-linux is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159080" version="1" comment="util-linux-lang is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159081" version="1" comment="util-linux-systemd is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159082" version="1" comment="uuidd is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512244" version="1" comment="libblkid1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512245" version="1" comment="libblkid1-32bit is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512246" version="1" comment="libfdisk1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512247" version="1" comment="libmount1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512248" version="1" comment="libmount1-32bit is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512249" version="1" comment="libsmartcols1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512250" version="1" comment="libuuid-devel is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512251" version="1" comment="libuuid1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512252" version="1" comment="libuuid1-32bit is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512253" version="1" comment="python-libmount is &lt;2.29.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512254" version="1" comment="util-linux is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512255" version="1" comment="util-linux-lang is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512256" version="1" comment="util-linux-systemd is &lt;2.29.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512257" version="1" comment="uuidd is &lt;2.29.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514629" version="1" comment="libarchive13 is &lt;3.1.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108423" version="1" comment="libarchive13 is &lt;3.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130724" version="1" comment="libarchive13 is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135964" version="1" comment="libarchive13 is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141243" version="1" comment="coreutils is &lt;8.22-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141244" version="1" comment="coreutils-lang is &lt;8.22-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114699" version="1" comment="coreutils is &lt;8.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114700" version="1" comment="coreutils-lang is &lt;8.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140496" version="1" comment="coreutils is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140497" version="1" comment="coreutils-lang is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512066" version="1" comment="coreutils is &lt;8.25-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512067" version="1" comment="coreutils-lang is &lt;8.25-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141400" version="1" comment="gnome-online-accounts is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141401" version="1" comment="gnome-online-accounts-lang is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141402" version="1" comment="libgoa-1_0-0 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141403" version="1" comment="libgoa-backend-1_0-1 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141404" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142108" version="1" comment="gnome-online-accounts is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142109" version="1" comment="gnome-online-accounts-lang is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140636" version="1" comment="libgoa-1_0-0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142110" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140637" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142111" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159641" version="1" comment="gnome-online-accounts is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159642" version="1" comment="gnome-online-accounts-lang is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159138" version="1" comment="libgoa-1_0-0 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159643" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159139" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159644" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521959" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514863" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514864" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514865" version="1" comment="python is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514866" version="1" comment="python-base is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514867" version="1" comment="python-curses is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514868" version="1" comment="python-devel is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514869" version="1" comment="python-tk is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514870" version="1" comment="python-xml is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334192" version="1" comment="ruby2.1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140739" version="1" comment="libX11-6 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140740" version="1" comment="libX11-6-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140741" version="1" comment="libX11-data is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140742" version="1" comment="libX11-xcb1 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140743" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136381" version="1" comment="libX11-6 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136382" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136383" version="1" comment="libX11-data is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136384" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136385" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512231" version="1" comment="libX11-6 is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512232" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512233" version="1" comment="libX11-data is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512234" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512235" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140748" version="1" comment="libXext6 is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140749" version="1" comment="libXext6-32bit is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512238" version="1" comment="libXext6 is &lt;1.3.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512239" version="1" comment="libXext6-32bit is &lt;1.3.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140750" version="1" comment="libXfixes3 is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140751" version="1" comment="libXfixes3-32bit is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135061" version="1" comment="libXfixes3 is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135062" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141438" version="1" comment="libXi6 is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141439" version="1" comment="libXi6-32bit is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140753" version="1" comment="libXi6 is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140754" version="1" comment="libXi6-32bit is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136640" version="1" comment="libXi6 is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136641" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140755" version="1" comment="libXinerama1 is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140756" version="1" comment="libXinerama1-32bit is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141440" version="1" comment="libXrandr2 is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141441" version="1" comment="libXrandr2-32bit is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140759" version="1" comment="libXrandr2 is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140760" version="1" comment="libXrandr2-32bit is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140761" version="1" comment="libXrender1 is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140762" version="1" comment="libXrender1-32bit is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135553" version="1" comment="libXrender1 is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135554" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140744" version="1" comment="libXRes1 is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140745" version="1" comment="libXRes1-32bit is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140767" version="1" comment="libXv1 is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140768" version="1" comment="libXv1-32bit is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135086" version="1" comment="libXv1 is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135087" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140769" version="1" comment="libXvMC1 is &lt;1.0.8-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135556" version="1" comment="libXvMC1 is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140773" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140838" version="1" comment="libdmx1 is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140774" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140775" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140763" version="1" comment="libXt6 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140764" version="1" comment="libXt6-32bit is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140746" version="1" comment="libXcursor1 is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140747" version="1" comment="libXcursor1-32bit is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512236" version="1" comment="libXcursor1 is &lt;1.1.14-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512237" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140757" version="1" comment="libXp6 is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140758" version="1" comment="libXp6-32bit is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140765" version="1" comment="libXtst6 is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140766" version="1" comment="libXtst6-32bit is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135081" version="1" comment="libXtst6 is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135082" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141728" version="1" comment="libxcb-dri2-0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141729" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141730" version="1" comment="libxcb-glx0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141731" version="1" comment="libxcb-glx0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141732" version="1" comment="libxcb-randr0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141733" version="1" comment="libxcb-render0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141734" version="1" comment="libxcb-render0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141735" version="1" comment="libxcb-shape0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141736" version="1" comment="libxcb-shm0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141737" version="1" comment="libxcb-shm0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141738" version="1" comment="libxcb-sync1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141739" version="1" comment="libxcb-xf86dri0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141740" version="1" comment="libxcb-xfixes0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141741" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141742" version="1" comment="libxcb-xkb1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141743" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141744" version="1" comment="libxcb-xv0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141745" version="1" comment="libxcb1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141746" version="1" comment="libxcb1-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141007" version="1" comment="libxcb-dri2-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141008" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141009" version="1" comment="libxcb-dri3-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141010" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141011" version="1" comment="libxcb-glx0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141012" version="1" comment="libxcb-glx0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141013" version="1" comment="libxcb-present0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141014" version="1" comment="libxcb-present0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141015" version="1" comment="libxcb-randr0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141016" version="1" comment="libxcb-render0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141017" version="1" comment="libxcb-render0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141018" version="1" comment="libxcb-shape0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141019" version="1" comment="libxcb-shm0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141020" version="1" comment="libxcb-shm0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141021" version="1" comment="libxcb-sync1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141022" version="1" comment="libxcb-sync1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141023" version="1" comment="libxcb-xf86dri0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141024" version="1" comment="libxcb-xfixes0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141025" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141026" version="1" comment="libxcb-xinerama0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141027" version="1" comment="libxcb-xkb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141028" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141029" version="1" comment="libxcb-xv0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141030" version="1" comment="libxcb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141031" version="1" comment="libxcb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512536" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512537" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512538" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512539" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512540" version="1" comment="libxcb-glx0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512541" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512542" version="1" comment="libxcb-present0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512543" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512544" version="1" comment="libxcb-randr0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512545" version="1" comment="libxcb-render0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512546" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512547" version="1" comment="libxcb-shape0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512548" version="1" comment="libxcb-shm0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512549" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512550" version="1" comment="libxcb-sync1 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512551" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512552" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512553" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512554" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512555" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512556" version="1" comment="libxcb-xkb1 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512557" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512558" version="1" comment="libxcb-xv0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512559" version="1" comment="libxcb1 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512560" version="1" comment="libxcb1-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333937" version="1" comment="xen is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141629" version="1" comment="libraw9 is &lt;0.15.4-3.88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512415" version="1" comment="libraw9 is &lt;0.15.4-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517178" version="1" comment="rrdtool is &lt;1.4.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517179" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146857" version="1" comment="rrdtool is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146858" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140951" version="1" comment="libsrtp1 is &lt;1.5.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512483" version="1" comment="libsrtp1 is &lt;1.5.2-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142127" version="1" comment="imobiledevice-tools is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140847" version="1" comment="libimobiledevice6 is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333957" version="1" comment="libreoffice is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141509" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154924" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515261" version="1" comment="xen is &lt;4.4.1_08-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515262" version="1" comment="xen-kmp-default is &lt;4.4.1_08_k3.12.28_4-5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515263" version="1" comment="xen-libs is &lt;4.4.1_08-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515264" version="1" comment="xen-libs-32bit is &lt;4.4.1_08-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141804" version="1" comment="socat is &lt;1.7.2.4-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122758" version="1" comment="socat is &lt;1.7.2.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516528" version="1" comment="freerdp is &lt;1.0.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516529" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516530" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141168" version="1" comment="xlockmore is &lt;5.43-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521020" version="1" comment="libmodplug1 is &lt;0.8.9.0+git20170610.f6dd59a-15.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141777" version="1" comment="python is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141778" version="1" comment="python-curses is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141779" version="1" comment="python-tk is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141780" version="1" comment="python3 is &lt;3.4.1-2.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142044" version="1" comment="python is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142045" version="1" comment="python-curses is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142046" version="1" comment="python-tk is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141074" version="1" comment="python3 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130998" version="1" comment="python is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131000" version="1" comment="python-curses is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131002" version="1" comment="python-tk is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141075" version="1" comment="python3-curses is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159263" version="1" comment="python is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159265" version="1" comment="python-curses is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159269" version="1" comment="python-tk is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159274" version="1" comment="python3 is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159275" version="1" comment="python3-curses is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512594" version="1" comment="python is &lt;2.7.13-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512595" version="1" comment="python-curses is &lt;2.7.13-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512596" version="1" comment="python-tk is &lt;2.7.13-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512601" version="1" comment="python3 is &lt;3.4.6-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512602" version="1" comment="python3-curses is &lt;3.4.6-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141522" version="1" comment="libgcrypt20 is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141523" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114243" version="1" comment="libgcrypt20 is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114244" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131105" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131106" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156955" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156956" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512320" version="1" comment="libgcrypt20 is &lt;1.6.1-16.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512321" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334343" version="1" comment="orca is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514692" version="1" comment="libspice-server1 is &lt;0.12.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333998" version="1" comment="spice is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142017" version="1" comment="libspice-server1 is &lt;0.12.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140950" version="1" comment="libspice-server1 is &lt;0.12.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159202" version="1" comment="libspice-server1 is &lt;0.12.8-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512482" version="1" comment="libspice-server1 is &lt;0.12.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141789" version="1" comment="python-pyOpenSSL is &lt;0.14-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141084" version="1" comment="python-pyOpenSSL is &lt;16.0.0-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512598" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512599" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141122" version="1" comment="rtkit is &lt;0.11_git201205151338-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333941" version="1" comment="compat-openssl098 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333944" version="1" comment="openssl-1_1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141417" version="1" comment="ibus-chewing is &lt;1.4.10.1-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141418" version="1" comment="ibus-pinyin is &lt;1.5.0-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140683" version="1" comment="ibus-chewing is &lt;1.4.14-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140684" version="1" comment="ibus-pinyin is &lt;1.5.0-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159032" version="1" comment="ibus-pinyin is &lt;1.5.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516038" version="1" comment="xen is &lt;4.4.4_02-22.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516039" version="1" comment="xen-kmp-default is &lt;4.4.4_02_k3.12.55_52.42-22.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516040" version="1" comment="xen-libs is &lt;4.4.4_02-22.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516041" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-22.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516918" version="1" comment="xen is &lt;4.5.2_06-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516919" version="1" comment="xen-kmp-default is &lt;4.5.2_06_k3.12.53_60.30-7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516920" version="1" comment="xen-libs is &lt;4.5.2_06-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516921" version="1" comment="xen-libs-32bit is &lt;4.5.2_06-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561558" version="1" comment="python-ply is &lt;3.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516638" version="1" comment="ghostscript is &lt;9.15-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516639" version="1" comment="ghostscript-x11 is &lt;9.15-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155975" version="1" comment="ghostscript is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155976" version="1" comment="ghostscript-x11 is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512150" version="1" comment="ghostscript is &lt;9.25-23.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512151" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141560" version="1" comment="libjbig2 is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140690" version="1" comment="libjbig2-32bit is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140691" version="1" comment="libjson-c2 is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140692" version="1" comment="libjson-c2-32bit is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141752" version="1" comment="libyaml-0-2 is &lt;0.1.6-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514734" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141036" version="1" comment="libyaml-0-2 is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514709" version="1" comment="kernel-default is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514710" version="1" comment="kernel-default-devel is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514711" version="1" comment="kernel-default-extra is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514712" version="1" comment="kernel-devel is &lt;3.12.32-33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514713" version="1" comment="kernel-macros is &lt;3.12.32-33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514714" version="1" comment="kernel-source is &lt;3.12.32-33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514715" version="1" comment="kernel-syms is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514716" version="1" comment="kernel-xen is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514717" version="1" comment="kernel-xen-devel is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141085" version="1" comment="python-pywbem is &lt;0.7.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514922" version="1" comment="rpm is &lt;4.11.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514923" version="1" comment="rpm-32bit is &lt;4.11.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514924" version="1" comment="rpm-build is &lt;4.11.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514925" version="1" comment="rpm-python is &lt;4.11.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105405" version="1" comment="rpm is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105404" version="1" comment="rpm-32bit is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105406" version="1" comment="rpm-build is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141108" version="1" comment="rpm is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141109" version="1" comment="rpm-32bit is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141110" version="1" comment="rpm-build is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512613" version="1" comment="rpm is &lt;4.11.2-16.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512614" version="1" comment="rpm-32bit is &lt;4.11.2-16.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512615" version="1" comment="rpm-build is &lt;4.11.2-16.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141285" version="1" comment="cups-filters is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141286" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141287" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141288" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113515" version="1" comment="cups-filters is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113516" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113518" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113519" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119506" version="1" comment="cups-filters is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119507" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119508" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119509" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158956" version="1" comment="cups-filters is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158957" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158958" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158959" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512089" version="1" comment="cups-filters is &lt;1.0.58-19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512090" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512091" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512092" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141521" version="1" comment="libgadu3 is &lt;1.11.4-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514966" version="1" comment="clamav is &lt;0.98.5-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334112" version="1" comment="pam is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338849" version="1" comment="llvm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338850" version="1" comment="llvm6 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334128" version="1" comment="freetype2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334114" version="1" comment="perl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514582" version="1" comment="glibc is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514583" version="1" comment="glibc-32bit is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514584" version="1" comment="glibc-devel is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514585" version="1" comment="glibc-devel-32bit is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514586" version="1" comment="glibc-i18ndata is &lt;2.19-20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514587" version="1" comment="glibc-locale is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514588" version="1" comment="glibc-locale-32bit is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514589" version="1" comment="nscd is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334058" version="1" comment="SDL is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334344" version="1" comment="libX11 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334055" version="1" comment="xorg-x11 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334345" version="1" comment="xorg-x11-driver-video is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333972" version="1" comment="xorg-x11-libs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333983" version="1" comment="sqlite3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515836" version="1" comment="kernel-default is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515837" version="1" comment="kernel-default-devel is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515838" version="1" comment="kernel-default-extra is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515839" version="1" comment="kernel-devel is &lt;3.12.55-52.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515840" version="1" comment="kernel-macros is &lt;3.12.55-52.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515841" version="1" comment="kernel-source is &lt;3.12.55-52.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515842" version="1" comment="kernel-syms is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515843" version="1" comment="kernel-xen is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515844" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516854" version="1" comment="kernel-default is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516855" version="1" comment="kernel-default-devel is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516856" version="1" comment="kernel-default-extra is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516857" version="1" comment="kernel-devel is &lt;3.12.53-60.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516858" version="1" comment="kernel-macros is &lt;3.12.53-60.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516859" version="1" comment="kernel-source is &lt;3.12.53-60.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516860" version="1" comment="kernel-syms is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516861" version="1" comment="kernel-xen is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516862" version="1" comment="kernel-xen-devel is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516551" version="1" comment="gtk2-lang is &lt;2.24.24-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516552" version="1" comment="gtk2-tools is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516553" version="1" comment="gtk2-tools-32bit is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516554" version="1" comment="libgtk-2_0-0 is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516555" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516556" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140555" version="1" comment="eog is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140556" version="1" comment="eog-lang is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140657" version="1" comment="gtk2-data is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140658" version="1" comment="gtk2-lang is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140659" version="1" comment="gtk2-tools is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140660" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140661" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140662" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142126" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516118" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140969" version="1" comment="libudisks2-0 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140970" version="1" comment="udisks2 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140971" version="1" comment="udisks2-lang is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141817" version="1" comment="tigervnc is &lt;1.3.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141818" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142062" version="1" comment="tigervnc is &lt;1.4.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142063" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140770" version="1" comment="libXvnc1 is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140771" version="1" comment="tigervnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140772" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154696" version="1" comment="libXvnc1 is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154697" version="1" comment="tigervnc is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154698" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512241" version="1" comment="libXvnc1 is &lt;1.6.0-18.23.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512242" version="1" comment="tigervnc is &lt;1.6.0-18.23.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512243" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.23.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141828" version="1" comment="xalan-j2 is &lt;2.7.0-264.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159043" version="1" comment="lftp is &lt;4.7.4-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512212" version="1" comment="lftp is &lt;4.7.4-3.3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141304" version="1" comment="elfutils is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141305" version="1" comment="libasm1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141306" version="1" comment="libdw1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141307" version="1" comment="libdw1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141308" version="1" comment="libebl1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141309" version="1" comment="libebl1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141310" version="1" comment="libelf1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141311" version="1" comment="libelf1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106094" version="1" comment="elfutils is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106096" version="1" comment="libasm1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106099" version="1" comment="libdw1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106100" version="1" comment="libdw1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106102" version="1" comment="libebl1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106103" version="1" comment="libebl1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106106" version="1" comment="libelf1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106107" version="1" comment="libelf1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106104" version="1" comment="libelf-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517391" version="1" comment="libxml2-2 is &lt;2.9.1-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517392" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517393" version="1" comment="libxml2-tools is &lt;2.9.1-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517394" version="1" comment="python-libxml2 is &lt;2.9.1-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515125" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-70.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515126" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-70.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516562" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516563" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516564" version="1" comment="libsss_sudo is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516565" version="1" comment="python-sssd-config is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516566" version="1" comment="sssd is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516567" version="1" comment="sssd-32bit is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516568" version="1" comment="sssd-ad is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516569" version="1" comment="sssd-ipa is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516570" version="1" comment="sssd-krb5 is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516571" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516572" version="1" comment="sssd-ldap is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516573" version="1" comment="sssd-proxy is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516574" version="1" comment="sssd-tools is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141342" version="1" comment="freerdp is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141343" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141344" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142100" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142101" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162218" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162219" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141757" version="1" comment="mutt is &lt;1.5.21-44.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105068" version="1" comment="mutt is &lt;1.5.21-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141043" version="1" comment="mutt is &lt;1.6.0-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512576" version="1" comment="mutt is &lt;1.10.1-55.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514443" version="1" comment="flash-player is &lt;11.2.202.411-4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514444" version="1" comment="flash-player-gnome is &lt;11.2.202.411-4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514449" version="1" comment="flash-player is &lt;11.2.202.418-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514450" version="1" comment="flash-player-gnome is &lt;11.2.202.418-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514804" version="1" comment="flash-player is &lt;11.2.202.481-93.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514805" version="1" comment="flash-player-gnome is &lt;11.2.202.481-93.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514377" version="1" comment="flash-player is &lt;11.2.202.425-19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514378" version="1" comment="flash-player-gnome is &lt;11.2.202.425-19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520679" version="1" comment="zsh is &lt;5.0.5-6.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512641" version="1" comment="zsh is &lt;5.0.5-6.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514635" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514636" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514637" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514638" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514639" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514640" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514641" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514642" version="1" comment="libwebkitgtk2-lang is &lt;2.4.8-16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514643" version="1" comment="libwebkitgtk3-lang is &lt;2.4.8-16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514644" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514645" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141755" version="1" comment="mozilla-nspr is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141756" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116016" version="1" comment="mozilla-nspr is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116015" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129286" version="1" comment="mozilla-nspr is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129287" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155320" version="1" comment="mozilla-nspr is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155321" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514497" version="1" comment="MozillaFirefox is &lt;31.3.0esr-15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514498" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514499" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514500" version="1" comment="libfreebl3 is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514501" version="1" comment="libfreebl3-32bit is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514502" version="1" comment="libsoftokn3 is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514503" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514504" version="1" comment="mozilla-nss is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514505" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514506" version="1" comment="mozilla-nss-certs is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514507" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514508" version="1" comment="mozilla-nss-tools is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514746" version="1" comment="MozillaFirefox is &lt;31.4.0esr-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514747" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514748" version="1" comment="libfreebl3 is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514749" version="1" comment="libfreebl3-32bit is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514750" version="1" comment="libsoftokn3 is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514751" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514752" version="1" comment="mozilla-nss is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514753" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514754" version="1" comment="mozilla-nss-certs is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514755" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514756" version="1" comment="mozilla-nss-tools is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334348" version="1" comment="python-xdg is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522258" version="1" comment="python-xdg is &lt;0.25-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142047" version="1" comment="python-requests is &lt;2.3.0-6.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141086" version="1" comment="python-requests is &lt;2.8.1-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159273" version="1" comment="python-requests is &lt;2.8.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512600" version="1" comment="python-requests is &lt;2.11.1-6.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139059" version="1" comment="python3-requests is &lt;2.7.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141787" version="1" comment="python-imaging is &lt;1.1.7-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514559" version="1" comment="ft2demos is &lt;2.5.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514560" version="1" comment="libfreetype6 is &lt;2.5.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514561" version="1" comment="libfreetype6-32bit is &lt;2.5.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141350" version="1" comment="gd is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141351" version="1" comment="gd-32bit is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109545" version="1" comment="gd is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109546" version="1" comment="gd-32bit is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131048" version="1" comment="gd is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131049" version="1" comment="gd-32bit is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148438" version="1" comment="gd is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148439" version="1" comment="gd-32bit is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512137" version="1" comment="gd is &lt;2.1.0-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512138" version="1" comment="gd-32bit is &lt;2.1.0-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141221" version="1" comment="bash is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141222" version="1" comment="bash-doc is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141223" version="1" comment="bash-lang is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141224" version="1" comment="libreadline6 is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141225" version="1" comment="libreadline6-32bit is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141226" version="1" comment="readline-doc is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140477" version="1" comment="bash is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140478" version="1" comment="bash-doc is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142078" version="1" comment="bash-lang is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140479" version="1" comment="libreadline6 is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140480" version="1" comment="libreadline6-32bit is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140481" version="1" comment="readline-doc is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155546" version="1" comment="bash is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155547" version="1" comment="bash-doc is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155548" version="1" comment="bash-lang is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155549" version="1" comment="libreadline6 is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155550" version="1" comment="libreadline6-32bit is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155551" version="1" comment="readline-doc is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512033" version="1" comment="bash is &lt;4.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512034" version="1" comment="bash-doc is &lt;4.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512035" version="1" comment="bash-lang is &lt;4.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512036" version="1" comment="libreadline6 is &lt;6.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512037" version="1" comment="libreadline6-32bit is &lt;6.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512038" version="1" comment="readline-doc is &lt;6.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141762" version="1" comment="openssh is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141763" version="1" comment="openssh-helpers is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114322" version="1" comment="openssh is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114325" version="1" comment="openssh-helpers is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141045" version="1" comment="openssh is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141047" version="1" comment="openssh-helpers is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159254" version="1" comment="openssh is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159256" version="1" comment="openssh-helpers is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334349" version="1" comment="cifs-utils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140884" version="1" comment="libmms0 is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514679" version="1" comment="DirectFB is &lt;1.7.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514680" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514681" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514682" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109224" version="1" comment="DirectFB is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109231" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109233" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109234" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140428" version="1" comment="DirectFB is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140429" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140430" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142073" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141072" version="1" comment="ppp is &lt;2.4.7-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148440" version="1" comment="ppp is &lt;2.4.7-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141068" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141328" version="1" comment="facter is &lt;2.0.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141860" version="1" comment="facter is &lt;2.0.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159633" version="1" comment="facter is &lt;2.4.6-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512121" version="1" comment="facter is &lt;2.4.6-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141700" version="1" comment="libtasn1 is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141701" version="1" comment="libtasn1-6 is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141702" version="1" comment="libtasn1-6-32bit is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109692" version="1" comment="libtasn1 is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109693" version="1" comment="libtasn1-6 is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109694" version="1" comment="libtasn1-6-32bit is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128901" version="1" comment="libtasn1 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128902" version="1" comment="libtasn1-6 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128903" version="1" comment="libtasn1-6-32bit is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159215" version="1" comment="libtasn1 is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159216" version="1" comment="libtasn1-6 is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159217" version="1" comment="libtasn1-6-32bit is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170495" version="1" comment="libtasn1 is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170496" version="1" comment="libtasn1-6 is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170497" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514519" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514520" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514521" version="1" comment="openssl is &lt;1.0.1i-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140643" version="1" comment="gpgme is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140644" version="1" comment="libgpgme11 is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561580" version="1" comment="PackageKit is &lt;0.8.16-11.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561581" version="1" comment="PackageKit-backend-zypp is &lt;0.8.16-11.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561582" version="1" comment="PackageKit-gstreamer-plugin is &lt;0.8.16-11.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561583" version="1" comment="PackageKit-lang is &lt;0.8.16-11.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514887" version="1" comment="evolution-data-server is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514888" version="1" comment="evolution-data-server-lang is &lt;3.10.4-5.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561584" version="1" comment="gnome-packagekit is &lt;3.10.1-8.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561585" version="1" comment="gnome-packagekit-lang is &lt;3.10.1-8.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514577" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514578" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.75-11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514889" version="1" comment="libcamel-1_2-45 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514890" version="1" comment="libcamel-1_2-45-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514891" version="1" comment="libebackend-1_2-7 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514892" version="1" comment="libebackend-1_2-7-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514893" version="1" comment="libebook-1_2-14 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514894" version="1" comment="libebook-1_2-14-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514895" version="1" comment="libebook-contacts-1_2-0 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514896" version="1" comment="libebook-contacts-1_2-0-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514897" version="1" comment="libecal-1_2-16 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514898" version="1" comment="libecal-1_2-16-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514899" version="1" comment="libedata-book-1_2-20 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514900" version="1" comment="libedata-book-1_2-20-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514901" version="1" comment="libedata-cal-1_2-23 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514902" version="1" comment="libedata-cal-1_2-23-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514903" version="1" comment="libedataserver-1_2-18 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514904" version="1" comment="libedataserver-1_2-18-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514517" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-66.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514518" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-66.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561586" version="1" comment="libpackagekit-glib2-16 is &lt;0.8.16-11.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561587" version="1" comment="libsolv-tools is &lt;0.6.11-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561588" version="1" comment="libyui-ncurses-pkg6 is &lt;2.46.1-3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561589" version="1" comment="libyui-qt-pkg6 is &lt;2.44.7-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561590" version="1" comment="libzypp is &lt;14.39.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561591" version="1" comment="python-solv is &lt;0.6.11-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561592" version="1" comment="python-zypp is &lt;0.6.4-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561593" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;0.8.16-11.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561594" version="1" comment="yast2-pkg-bindings is &lt;3.1.20-3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561595" version="1" comment="zypper is &lt;1.11.32-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561596" version="1" comment="zypper-log is &lt;1.11.32-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159193" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159194" version="1" comment="ruby2.1 is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159195" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514984" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514985" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514986" version="1" comment="openssl is &lt;1.0.1i-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514794" version="1" comment="libgcrypt20 is &lt;1.6.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514795" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333951" version="1" comment="gpg2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516078" version="1" comment="qemu is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516079" version="1" comment="qemu-block-curl is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516080" version="1" comment="qemu-ipxe is &lt;1.0.0-48.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516081" version="1" comment="qemu-kvm is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516082" version="1" comment="qemu-seabios is &lt;1.7.4-48.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516083" version="1" comment="qemu-sgabios is &lt;8-48.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516084" version="1" comment="qemu-tools is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516085" version="1" comment="qemu-vgabios is &lt;1.7.4-48.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516086" version="1" comment="qemu-x86 is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514606" version="1" comment="xen is &lt;4.4.1_10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514607" version="1" comment="xen-kmp-default is &lt;4.4.1_10_k3.12.36_38-9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514608" version="1" comment="xen-libs is &lt;4.4.1_10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514609" version="1" comment="xen-libs-32bit is &lt;4.4.1_10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141775" version="1" comment="procmail is &lt;3.22-267.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169961" version="1" comment="procmail is &lt;3.22-269.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514447" version="1" comment="rsyslog is &lt;8.4.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141134" version="1" comment="syslog-service is &lt;2.0-778.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514387" version="1" comment="dbus-1 is &lt;1.8.12-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514388" version="1" comment="dbus-1-x11 is &lt;1.8.12-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514389" version="1" comment="libdbus-1-3 is &lt;1.8.12-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514390" version="1" comment="libdbus-1-3-32bit is &lt;1.8.12-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514770" version="1" comment="kernel-default is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514771" version="1" comment="kernel-default-devel is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514772" version="1" comment="kernel-default-extra is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514773" version="1" comment="kernel-devel is &lt;3.12.43-52.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514774" version="1" comment="kernel-macros is &lt;3.12.43-52.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514775" version="1" comment="kernel-source is &lt;3.12.43-52.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514776" version="1" comment="kernel-syms is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514777" version="1" comment="kernel-xen is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514778" version="1" comment="kernel-xen-devel is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515009" version="1" comment="libvirt is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515010" version="1" comment="libvirt-client is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515011" version="1" comment="libvirt-client-32bit is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515012" version="1" comment="libvirt-daemon is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515013" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515014" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515015" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515016" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515017" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515018" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515019" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515020" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515021" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515022" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515023" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515024" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515025" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515026" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515027" version="1" comment="libvirt-doc is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514528" version="1" comment="libxml2-2 is &lt;2.9.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514529" version="1" comment="libxml2-2-32bit is &lt;2.9.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514530" version="1" comment="libxml2-tools is &lt;2.9.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514531" version="1" comment="python-libxml2 is &lt;2.9.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516302" version="1" comment="xen is &lt;4.5.3_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516303" version="1" comment="xen-kmp-default is &lt;4.5.3_08_k3.12.59_60.45-17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516304" version="1" comment="xen-libs is &lt;4.5.3_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516305" version="1" comment="xen-libs-32bit is &lt;4.5.3_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514590" version="1" comment="kernel-default is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514591" version="1" comment="kernel-default-devel is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514592" version="1" comment="kernel-default-extra is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514593" version="1" comment="kernel-devel is &lt;3.12.38-44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514594" version="1" comment="kernel-macros is &lt;3.12.38-44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514595" version="1" comment="kernel-source is &lt;3.12.38-44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514596" version="1" comment="kernel-syms is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514597" version="1" comment="kernel-xen is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514598" version="1" comment="kernel-xen-devel is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141803" version="1" comment="shim is &lt;0.7-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142059" version="1" comment="shim is &lt;0.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141125" version="1" comment="shim is &lt;0.9-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159306" version="1" comment="shim is &lt;0.9-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514741" version="1" comment="wpa_supplicant is &lt;2.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110201" version="1" comment="wpa_supplicant is &lt;2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131098" version="1" comment="wpa_supplicant is &lt;2.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165686" version="1" comment="wpa_supplicant is &lt;2.2-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514956" version="1" comment="kernel-default is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514957" version="1" comment="kernel-default-devel is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514958" version="1" comment="kernel-default-extra is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514959" version="1" comment="kernel-devel is &lt;3.12.36-38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514960" version="1" comment="kernel-macros is &lt;3.12.36-38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514961" version="1" comment="kernel-source is &lt;3.12.36-38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514962" version="1" comment="kernel-syms is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514963" version="1" comment="kernel-xen is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514964" version="1" comment="kernel-xen-devel is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514451" version="1" comment="libreoffice is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514452" version="1" comment="libreoffice-base is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514453" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514454" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514455" version="1" comment="libreoffice-calc is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514456" version="1" comment="libreoffice-calc-extensions is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514457" version="1" comment="libreoffice-draw is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514458" version="1" comment="libreoffice-filters-optional is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514459" version="1" comment="libreoffice-gnome is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514460" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514461" version="1" comment="libreoffice-impress is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514462" version="1" comment="libreoffice-l10n-af is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514463" version="1" comment="libreoffice-l10n-ar is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514464" version="1" comment="libreoffice-l10n-ca is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514465" version="1" comment="libreoffice-l10n-cs is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514466" version="1" comment="libreoffice-l10n-da is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514467" version="1" comment="libreoffice-l10n-de is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514468" version="1" comment="libreoffice-l10n-en is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514469" version="1" comment="libreoffice-l10n-es is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514470" version="1" comment="libreoffice-l10n-fi is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514471" version="1" comment="libreoffice-l10n-fr is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514472" version="1" comment="libreoffice-l10n-gu is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514473" version="1" comment="libreoffice-l10n-hi is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514474" version="1" comment="libreoffice-l10n-hu is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514475" version="1" comment="libreoffice-l10n-it is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514476" version="1" comment="libreoffice-l10n-ja is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514477" version="1" comment="libreoffice-l10n-ko is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514478" version="1" comment="libreoffice-l10n-nb is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514479" version="1" comment="libreoffice-l10n-nl is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514480" version="1" comment="libreoffice-l10n-nn is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514481" version="1" comment="libreoffice-l10n-pl is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514482" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514483" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514484" version="1" comment="libreoffice-l10n-ru is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514485" version="1" comment="libreoffice-l10n-sk is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514486" version="1" comment="libreoffice-l10n-sv is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514487" version="1" comment="libreoffice-l10n-xh is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514488" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514489" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514490" version="1" comment="libreoffice-l10n-zu is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514491" version="1" comment="libreoffice-mailmerge is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514492" version="1" comment="libreoffice-math is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514493" version="1" comment="libreoffice-officebean is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514494" version="1" comment="libreoffice-pyuno is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514495" version="1" comment="libreoffice-writer is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514496" version="1" comment="libreoffice-writer-extensions is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514368" version="1" comment="finch is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514369" version="1" comment="libpurple is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514370" version="1" comment="libpurple-lang is &lt;2.10.9-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514371" version="1" comment="libpurple-meanwhile is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514372" version="1" comment="libpurple-tcl is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514373" version="1" comment="pidgin is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514791" version="1" comment="curl is &lt;7.37.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514792" version="1" comment="libcurl4 is &lt;7.37.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514793" version="1" comment="libcurl4-32bit is &lt;7.37.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514524" version="1" comment="file is &lt;5.19-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514525" version="1" comment="file-magic is &lt;5.19-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514526" version="1" comment="libmagic1 is &lt;5.19-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514527" version="1" comment="libmagic1-32bit is &lt;5.19-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140915" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140916" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140917" version="1" comment="libpulse0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140918" version="1" comment="libpulse0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140919" version="1" comment="pulseaudio is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140920" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140921" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140922" version="1" comment="pulseaudio-lang is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141601" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141602" version="1" comment="pulseaudio-module-gconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141603" version="1" comment="pulseaudio-module-jack is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141604" version="1" comment="pulseaudio-module-lirc is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140923" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140924" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140925" version="1" comment="pulseaudio-utils is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159175" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159176" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159177" version="1" comment="libpulse0 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159178" version="1" comment="libpulse0-32bit is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159179" version="1" comment="pulseaudio is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159180" version="1" comment="pulseaudio-esound-compat is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159181" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159182" version="1" comment="pulseaudio-lang is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159652" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159653" version="1" comment="pulseaudio-module-gconf is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159654" version="1" comment="pulseaudio-module-jack is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159655" version="1" comment="pulseaudio-module-lirc is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159183" version="1" comment="pulseaudio-module-x11 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159184" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159185" version="1" comment="pulseaudio-utils is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141561" version="1" comment="liblzo2-2 is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140883" version="1" comment="liblzo2-2-32bit is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514448" version="1" comment="wget is &lt;1.14-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141833" version="1" comment="xf86-video-intel is &lt;2.99.914-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142068" version="1" comment="xf86-video-intel is &lt;2.99.914-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141165" version="1" comment="xf86-video-intel is &lt;2.99.917.641_ge4ef6e9-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159323" version="1" comment="xf86-video-intel is &lt;2.99.917.770_gcb6ba2da-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512632" version="1" comment="xf86-video-intel is &lt;2.99.917+git781.c8990575-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517305" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517306" version="1" comment="ruby2.1 is &lt;2.1.9-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517307" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141249" version="1" comment="cpp48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141250" version="1" comment="gcc48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141251" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141252" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141253" version="1" comment="gcc48-gij is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141254" version="1" comment="gcc48-gij-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141255" version="1" comment="gcc48-info is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141256" version="1" comment="libasan0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141257" version="1" comment="libasan0-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141258" version="1" comment="libatomic1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141259" version="1" comment="libatomic1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141260" version="1" comment="libffi4 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141261" version="1" comment="libffi4-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141262" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141263" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141264" version="1" comment="libgcj48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141265" version="1" comment="libgcj48-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141266" version="1" comment="libgcj48-jar is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141267" version="1" comment="libgcj_bc1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141268" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141269" version="1" comment="libgomp1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141270" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141271" version="1" comment="libitm1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141272" version="1" comment="libitm1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141273" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141274" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141275" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141276" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141277" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141278" version="1" comment="libtsan0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115214" version="1" comment="cpp48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115215" version="1" comment="gcc48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115258" version="1" comment="gcc48-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115217" version="1" comment="gcc48-c++ is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115239" version="1" comment="gcc48-gij is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115238" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115219" version="1" comment="gcc48-info is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115224" version="1" comment="libasan0 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115263" version="1" comment="libasan0-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115242" version="1" comment="libgcj48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115241" version="1" comment="libgcj48-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115245" version="1" comment="libgcj48-jar is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115246" version="1" comment="libgcj_bc1 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115232" version="1" comment="libstdc++48-devel is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115271" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140498" version="1" comment="cpp48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140499" version="1" comment="gcc48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140500" version="1" comment="gcc48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140501" version="1" comment="gcc48-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142081" version="1" comment="gcc48-gij is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142082" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140502" version="1" comment="gcc48-info is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140504" version="1" comment="libasan0 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140505" version="1" comment="libasan0-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142083" version="1" comment="libgcj48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142084" version="1" comment="libgcj48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142085" version="1" comment="libgcj48-jar is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142086" version="1" comment="libgcj_bc1 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140506" version="1" comment="libstdc++48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140507" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512070" version="1" comment="cpp48 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512071" version="1" comment="gcc48 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512072" version="1" comment="gcc48-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512073" version="1" comment="gcc48-c++ is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512074" version="1" comment="gcc48-gij is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512075" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512076" version="1" comment="gcc48-info is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512077" version="1" comment="libasan0 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512078" version="1" comment="libasan0-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512079" version="1" comment="libgcj48 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512080" version="1" comment="libgcj48-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512081" version="1" comment="libgcj48-jar is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512082" version="1" comment="libgcj_bc1 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512083" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512084" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338821" version="1" comment="ntp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338872" version="1" comment="mdadm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515085" version="1" comment="krb5 is &lt;1.12.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515086" version="1" comment="krb5-32bit is &lt;1.12.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515087" version="1" comment="krb5-client is &lt;1.12.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140879" version="1" comment="liblua5_2 is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140881" version="1" comment="lua is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159160" version="1" comment="liblua5_2 is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159162" version="1" comment="lua is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515301" version="1" comment="libvncclient0 is &lt;0.9.9-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515302" version="1" comment="libvncserver0 is &lt;0.9.9-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140839" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170043" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516642" version="1" comment="bash is &lt;4.2-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516643" version="1" comment="bash-doc is &lt;4.2-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516644" version="1" comment="bash-lang is &lt;4.2-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516645" version="1" comment="libreadline6 is &lt;6.2-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516646" version="1" comment="libreadline6-32bit is &lt;6.2-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516647" version="1" comment="readline-doc is &lt;6.2-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514445" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514446" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.71-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141754" version="1" comment="libzmq3 is &lt;4.0.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114236" version="1" comment="libzmq3 is &lt;4.0.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142147" version="1" comment="libzmq3 is &lt;4.0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159706" version="1" comment="libzmq3 is &lt;4.0.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516306" version="1" comment="ctags is &lt;5.8-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130995" version="1" comment="ctags is &lt;5.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514580" version="1" comment="gnome-settings-daemon is &lt;3.10.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514581" version="1" comment="gnome-settings-daemon-lang is &lt;3.10.2-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107802" version="1" comment="gnome-settings-daemon is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107804" version="1" comment="gnome-settings-daemon-lang is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140638" version="1" comment="gnome-settings-daemon is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140639" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158999" version="1" comment="gnome-settings-daemon is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159000" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512166" version="1" comment="gnome-settings-daemon is &lt;3.20.1-50.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512167" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-50.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515074" version="1" comment="qemu is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515075" version="1" comment="qemu-block-curl is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515076" version="1" comment="qemu-ipxe is &lt;1.0.0-48.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515077" version="1" comment="qemu-kvm is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515078" version="1" comment="qemu-seabios is &lt;1.7.4-48.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515079" version="1" comment="qemu-sgabios is &lt;8-48.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515080" version="1" comment="qemu-tools is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515081" version="1" comment="qemu-vgabios is &lt;1.7.4-48.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515082" version="1" comment="qemu-x86 is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515292" version="1" comment="qemu is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515293" version="1" comment="qemu-block-curl is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515294" version="1" comment="qemu-ipxe is &lt;1.0.0-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515295" version="1" comment="qemu-kvm is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515296" version="1" comment="qemu-seabios is &lt;1.7.4-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515297" version="1" comment="qemu-sgabios is &lt;8-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515298" version="1" comment="qemu-tools is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515299" version="1" comment="qemu-vgabios is &lt;1.7.4-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515300" version="1" comment="qemu-x86 is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514835" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514836" version="1" comment="ruby2.1 is &lt;2.1.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514837" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105408" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105409" version="1" comment="ruby2.1 is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105414" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140929" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140930" version="1" comment="ruby2.1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140931" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514677" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514678" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514782" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-28.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514783" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-28.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514386" version="1" comment="openvpn is &lt;2.3.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142043" version="1" comment="openvpn is &lt;2.3.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141048" version="1" comment="openvpn is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157217" version="1" comment="openvpn is &lt;2.3.8-16.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165998" version="1" comment="openvpn is &lt;2.3.8-16.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514439" version="1" comment="file is &lt;5.19-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514440" version="1" comment="file-magic is &lt;5.19-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514441" version="1" comment="libmagic1 is &lt;5.19-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514442" version="1" comment="libmagic1-32bit is &lt;5.19-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518307" version="1" comment="file is &lt;5.22-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518308" version="1" comment="file-magic is &lt;5.22-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518309" version="1" comment="libmagic1 is &lt;5.22-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518310" version="1" comment="libmagic1-32bit is &lt;5.22-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514806" version="1" comment="libaugeas0 is &lt;1.2.0-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515117" version="1" comment="glibc is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515118" version="1" comment="glibc-32bit is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515119" version="1" comment="glibc-devel is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515120" version="1" comment="glibc-devel-32bit is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515121" version="1" comment="glibc-i18ndata is &lt;2.19-22.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515122" version="1" comment="glibc-locale is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515123" version="1" comment="glibc-locale-32bit is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515124" version="1" comment="nscd is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514951" version="1" comment="libtiff5 is &lt;4.0.4-12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514952" version="1" comment="libtiff5-32bit is &lt;4.0.4-12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516833" version="1" comment="libtiff5 is &lt;4.0.7-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516834" version="1" comment="libtiff5-32bit is &lt;4.0.7-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519147" version="1" comment="libtiff5 is &lt;4.0.9-44.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519148" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514392" version="1" comment="libssh4 is &lt;0.6.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514968" version="1" comment="libjasper1 is &lt;1.900.1-166.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514969" version="1" comment="libjasper1-32bit is &lt;1.900.1-166.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106110" version="1" comment="libjasper1 is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106111" version="1" comment="libjasper1-32bit is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514574" version="1" comment="unzip is &lt;6.00-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106381" version="1" comment="unzip is &lt;6.00-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512628" version="1" comment="unzip is &lt;6.00-33.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515138" version="1" comment="apache-commons-logging is &lt;1.1.3-7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515139" version="1" comment="flute is &lt;1.3.0-4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515140" version="1" comment="libabw-0_1-1 is &lt;0.1.1-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515141" version="1" comment="libbase is &lt;1.1.3-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515142" version="1" comment="libcdr-0_1-1 is &lt;0.1.1-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515143" version="1" comment="libcmis-0_5-5 is &lt;0.5.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515144" version="1" comment="libe-book-0_1-1 is &lt;0.1.2-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515145" version="1" comment="libetonyek-0_1-1 is &lt;0.1.3-3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515146" version="1" comment="libfonts is &lt;1.1.3-4.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515147" version="1" comment="libformula is &lt;1.1.3-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515148" version="1" comment="libfreehand-0_1-1 is &lt;0.1.1-4.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515149" version="1" comment="libgltf-0_0-0 is &lt;0.0.1-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515150" version="1" comment="libgraphite2-3 is &lt;1.3.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515151" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515152" version="1" comment="libhyphen0 is &lt;2.8.8-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515153" version="1" comment="libixion-0_10-0 is &lt;0.9.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515154" version="1" comment="liblangtag1 is &lt;0.5.7-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515155" version="1" comment="liblayout is &lt;0.2.10-4.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515156" version="1" comment="libloader is &lt;1.1.3-3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515157" version="1" comment="libmspub-0_1-1 is &lt;0.1.2-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515158" version="1" comment="libmwaw-0_3-3 is &lt;0.3.6-3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515159" version="1" comment="libodfgen-0_1-1 is &lt;0.1.4-3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515160" version="1" comment="liborcus-0_8-0 is &lt;0.7.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515161" version="1" comment="libpagemaker-0_0-0 is &lt;0.0.2-2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515162" version="1" comment="libreoffice is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515163" version="1" comment="libreoffice-base is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515164" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515165" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515166" version="1" comment="libreoffice-calc is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515167" version="1" comment="libreoffice-calc-extensions is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515168" version="1" comment="libreoffice-draw is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515169" version="1" comment="libreoffice-filters-optional is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515170" version="1" comment="libreoffice-gnome is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515171" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515172" version="1" comment="libreoffice-impress is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515173" version="1" comment="libreoffice-l10n-af is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515174" version="1" comment="libreoffice-l10n-ar is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515175" version="1" comment="libreoffice-l10n-ca is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515176" version="1" comment="libreoffice-l10n-cs is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515177" version="1" comment="libreoffice-l10n-da is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515178" version="1" comment="libreoffice-l10n-de is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515179" version="1" comment="libreoffice-l10n-en is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515180" version="1" comment="libreoffice-l10n-es is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515181" version="1" comment="libreoffice-l10n-fi is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515182" version="1" comment="libreoffice-l10n-fr is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515183" version="1" comment="libreoffice-l10n-gu is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515184" version="1" comment="libreoffice-l10n-hi is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515185" version="1" comment="libreoffice-l10n-hu is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515186" version="1" comment="libreoffice-l10n-it is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515187" version="1" comment="libreoffice-l10n-ja is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515188" version="1" comment="libreoffice-l10n-ko is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515189" version="1" comment="libreoffice-l10n-nb is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515190" version="1" comment="libreoffice-l10n-nl is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515191" version="1" comment="libreoffice-l10n-nn is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515192" version="1" comment="libreoffice-l10n-pl is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515193" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515194" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515195" version="1" comment="libreoffice-l10n-ru is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515196" version="1" comment="libreoffice-l10n-sk is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515197" version="1" comment="libreoffice-l10n-sv is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515198" version="1" comment="libreoffice-l10n-xh is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515199" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515200" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515201" version="1" comment="libreoffice-l10n-zu is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515202" version="1" comment="libreoffice-mailmerge is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515203" version="1" comment="libreoffice-math is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515204" version="1" comment="libreoffice-officebean is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515205" version="1" comment="libreoffice-pyuno is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515206" version="1" comment="libreoffice-share-linker is &lt;1-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515207" version="1" comment="libreoffice-voikko is &lt;4.1-6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009107086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515208" version="1" comment="libreoffice-writer is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515209" version="1" comment="libreoffice-writer-extensions is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515210" version="1" comment="librepository is &lt;1.1.3-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515211" version="1" comment="librevenge-0_0-0 is &lt;0.0.2-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515212" version="1" comment="librevenge-stream-0_0-0 is &lt;0.0.2-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515213" version="1" comment="libserializer is &lt;1.1.2-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515214" version="1" comment="libvisio-0_1-1 is &lt;0.1.3-4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515215" version="1" comment="libvoikko1 is &lt;3.7.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515216" version="1" comment="libwps-0_4-4 is &lt;0.4.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515217" version="1" comment="malaga-suomi is &lt;1.18-3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515218" version="1" comment="myspell-af_ZA is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515219" version="1" comment="myspell-ar is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515220" version="1" comment="myspell-be_BY is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515221" version="1" comment="myspell-bg_BG is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515222" version="1" comment="myspell-bn_BD is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515223" version="1" comment="myspell-bs_BA is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515224" version="1" comment="myspell-ca is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515225" version="1" comment="myspell-cs_CZ is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515226" version="1" comment="myspell-da_DK is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515227" version="1" comment="myspell-de is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515228" version="1" comment="myspell-dictionaries is &lt;20150827-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515229" version="1" comment="myspell-el_GR is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515230" version="1" comment="myspell-en is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515231" version="1" comment="myspell-es is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515232" version="1" comment="myspell-et_EE is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515233" version="1" comment="myspell-fr_FR is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515234" version="1" comment="myspell-gu_IN is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515235" version="1" comment="myspell-he_IL is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515236" version="1" comment="myspell-hi_IN is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515237" version="1" comment="myspell-hr_HR is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515238" version="1" comment="myspell-hu_HU is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515239" version="1" comment="myspell-it_IT is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515240" version="1" comment="myspell-lo_LA is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515241" version="1" comment="myspell-lt_LT is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515242" version="1" comment="myspell-lv_LV is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515243" version="1" comment="myspell-nl_NL is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515244" version="1" comment="myspell-no is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515245" version="1" comment="myspell-pl_PL is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515246" version="1" comment="myspell-pt_BR is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515247" version="1" comment="myspell-pt_PT is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515248" version="1" comment="myspell-ro is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515249" version="1" comment="myspell-ru_RU is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515250" version="1" comment="myspell-sk_SK is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515251" version="1" comment="myspell-sl_SI is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515252" version="1" comment="myspell-sr is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515253" version="1" comment="myspell-sv_SE is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515254" version="1" comment="myspell-te_IN is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515255" version="1" comment="myspell-th_TH is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515256" version="1" comment="myspell-vi is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515257" version="1" comment="myspell-zu_ZA is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515258" version="1" comment="pentaho-libxml is &lt;1.1.3-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515259" version="1" comment="pentaho-reporting-flow-engine is &lt;0.9.4-4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515260" version="1" comment="sac is &lt;1.3-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518046" version="1" comment="icu is &lt;52.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518047" version="1" comment="libicu52_1 is &lt;52.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518048" version="1" comment="libicu52_1-32bit is &lt;52.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518049" version="1" comment="libicu52_1-data is &lt;52.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521004" version="1" comment="icu is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521005" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521006" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521007" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177510" version="1" comment="icu is &lt;52.1-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177511" version="1" comment="libicu52_1 is &lt;52.1-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177512" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177513" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515083" version="1" comment="libjasper1 is &lt;1.900.1-170.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515084" version="1" comment="libjasper1-32bit is &lt;1.900.1-170.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514570" version="1" comment="libecpg6 is &lt;9.3.6-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514571" version="1" comment="libpq5 is &lt;9.3.6-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514572" version="1" comment="libpq5-32bit is &lt;9.3.6-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514573" version="1" comment="postgresql93 is &lt;9.3.6-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514745" version="1" comment="autofs is &lt;5.0.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110200" version="1" comment="autofs is &lt;5.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140464" version="1" comment="autofs is &lt;5.0.9-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158944" version="1" comment="autofs is &lt;5.0.9-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512032" version="1" comment="autofs is &lt;5.0.9-28.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336726" version="1" comment="openldap2-client is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514361" version="1" comment="tigervnc is &lt;1.3.0-22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514362" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515701" version="1" comment="rsync is &lt;3.1.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514363" version="1" comment="ImageMagick is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514364" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514365" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514366" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514367" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514522" version="1" comment="flash-player is &lt;11.2.202.424-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514523" version="1" comment="flash-player-gnome is &lt;11.2.202.424-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514934" version="1" comment="binutils is &lt;2.24-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141850" version="1" comment="binutils is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140482" version="1" comment="binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514856" version="1" comment="bind-libs is &lt;9.9.5P1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514857" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514858" version="1" comment="bind-utils is &lt;9.9.5P1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334086" version="1" comment="ImageMagick is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514374" version="1" comment="gnutls is &lt;3.2.15-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514375" version="1" comment="libgnutls28 is &lt;3.2.15-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514376" version="1" comment="libgnutls28-32bit is &lt;3.2.15-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333958" version="1" comment="bind is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514391" version="1" comment="tcpdump is &lt;4.5.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517313" version="1" comment="libpcap1 is &lt;1.8.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517314" version="1" comment="libpcap1-32bit is &lt;1.8.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517315" version="1" comment="tcpdump is &lt;4.9.0-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154731" version="1" comment="tcpdump is &lt;4.9.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166091" version="1" comment="tcpdump is &lt;4.9.2-14.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514382" version="1" comment="libFLAC8 is &lt;1.3.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514383" version="1" comment="libFLAC8-32bit is &lt;1.3.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102936" version="1" comment="libFLAC8 is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102937" version="1" comment="libFLAC8-32bit is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140571" version="1" comment="libFLAC++6 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142129" version="1" comment="libFLAC++6-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140572" version="1" comment="libFLAC8 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140573" version="1" comment="libFLAC8-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514828" version="1" comment="libmysqlclient18 is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514829" version="1" comment="libmysqlclient18-32bit is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514830" version="1" comment="libmysqlclient_r18 is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514831" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514832" version="1" comment="mariadb is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514833" version="1" comment="mariadb-client is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514834" version="1" comment="mariadb-errormessages is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516735" version="1" comment="libpcre1 is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516736" version="1" comment="libpcre1-32bit is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516737" version="1" comment="libpcre16-0 is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516738" version="1" comment="libpcrecpp0 is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516739" version="1" comment="libpcrecpp0-32bit is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143034" version="1" comment="libpcre1 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143035" version="1" comment="libpcre1-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143036" version="1" comment="libpcre16-0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143037" version="1" comment="libpcrecpp0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143038" version="1" comment="libpcrecpp0-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512372" version="1" comment="libpcre1 is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512373" version="1" comment="libpcre1-32bit is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512374" version="1" comment="libpcre16-0 is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512375" version="1" comment="libpcrecpp0 is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512376" version="1" comment="libpcrecpp0-32bit is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514634" version="1" comment="libksba8 is &lt;1.3.0-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105094" version="1" comment="libksba8 is &lt;1.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128468" version="1" comment="libksba8 is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514612" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514613" version="1" comment="libjpeg62 is &lt;62.1.0-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514614" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514615" version="1" comment="libjpeg8 is &lt;8.0.2-30.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514616" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514617" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105080" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105088" version="1" comment="libjpeg62 is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105087" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105091" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105082" version="1" comment="libjpeg8 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105081" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105086" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170911" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170912" version="1" comment="libjpeg62 is &lt;62.2.0-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170913" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170914" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170915" version="1" comment="libjpeg8 is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170916" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170917" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514393" version="1" comment="libreoffice is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514394" version="1" comment="libreoffice-base is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514395" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514396" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514397" version="1" comment="libreoffice-calc is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514398" version="1" comment="libreoffice-calc-extensions is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514399" version="1" comment="libreoffice-draw is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514400" version="1" comment="libreoffice-filters-optional is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514401" version="1" comment="libreoffice-gnome is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514402" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514403" version="1" comment="libreoffice-impress is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514404" version="1" comment="libreoffice-l10n-af is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514405" version="1" comment="libreoffice-l10n-ar is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514406" version="1" comment="libreoffice-l10n-ca is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514407" version="1" comment="libreoffice-l10n-cs is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514408" version="1" comment="libreoffice-l10n-da is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514409" version="1" comment="libreoffice-l10n-de is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514410" version="1" comment="libreoffice-l10n-en is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514411" version="1" comment="libreoffice-l10n-es is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514412" version="1" comment="libreoffice-l10n-fi is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514413" version="1" comment="libreoffice-l10n-fr is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514414" version="1" comment="libreoffice-l10n-gu is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514415" version="1" comment="libreoffice-l10n-hi is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514416" version="1" comment="libreoffice-l10n-hu is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514417" version="1" comment="libreoffice-l10n-it is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514418" version="1" comment="libreoffice-l10n-ja is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514419" version="1" comment="libreoffice-l10n-ko is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514420" version="1" comment="libreoffice-l10n-nb is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514421" version="1" comment="libreoffice-l10n-nl is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514422" version="1" comment="libreoffice-l10n-nn is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514423" version="1" comment="libreoffice-l10n-pl is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514424" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514425" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514426" version="1" comment="libreoffice-l10n-ru is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514427" version="1" comment="libreoffice-l10n-sk is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514428" version="1" comment="libreoffice-l10n-sv is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514429" version="1" comment="libreoffice-l10n-xh is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514430" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514431" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514432" version="1" comment="libreoffice-l10n-zu is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514433" version="1" comment="libreoffice-mailmerge is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514434" version="1" comment="libreoffice-math is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514435" version="1" comment="libreoffice-officebean is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514436" version="1" comment="libreoffice-pyuno is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514437" version="1" comment="libreoffice-writer is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514438" version="1" comment="libreoffice-writer-extensions is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514379" version="1" comment="cpio is &lt;2.11-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514380" version="1" comment="cpio-lang is &lt;2.11-29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515047" version="1" comment="libblkid1 is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515048" version="1" comment="libblkid1-32bit is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515049" version="1" comment="libmount1 is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515050" version="1" comment="libmount1-32bit is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515051" version="1" comment="libsmartcols1 is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515052" version="1" comment="libuuid-devel is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515053" version="1" comment="libuuid1 is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515054" version="1" comment="libuuid1-32bit is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515055" version="1" comment="python-libmount is &lt;2.25-10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515056" version="1" comment="util-linux is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515057" version="1" comment="util-linux-lang is &lt;2.25-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515058" version="1" comment="util-linux-systemd is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515059" version="1" comment="uuidd is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514800" version="1" comment="mutt is &lt;1.5.21-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521146" version="1" comment="mutt is &lt;1.10.1-55.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514921" version="1" comment="libyaml-0-2 is &lt;0.1.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514633" version="1" comment="tcpdump is &lt;4.5.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108642" version="1" comment="tcpdump is &lt;4.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141140" version="1" comment="tcpdump is &lt;4.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334142" version="1" comment="graphviz is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515070" version="1" comment="strongswan is &lt;5.1.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515071" version="1" comment="strongswan-doc is &lt;5.1.3-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515072" version="1" comment="strongswan-ipsec is &lt;5.1.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515073" version="1" comment="strongswan-libs0 is &lt;5.1.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333996" version="1" comment="openssh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515064" version="1" comment="ntp is &lt;4.2.6p5-37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515065" version="1" comment="ntp-doc is &lt;4.2.6p5-37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514384" version="1" comment="ntp is &lt;4.2.6p5-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514385" version="1" comment="ntp-doc is &lt;4.2.6p5-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515089" version="1" comment="clamav is &lt;0.98.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333961" version="1" comment="glibc.i686 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515109" version="1" comment="elfutils is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515110" version="1" comment="libasm1 is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515111" version="1" comment="libdw1 is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515112" version="1" comment="libdw1-32bit is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515113" version="1" comment="libebl1 is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515114" version="1" comment="libebl1-32bit is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515115" version="1" comment="libelf1 is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515116" version="1" comment="libelf1-32bit is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333963" version="1" comment="exiv2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333935" version="1" comment="coreutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514990" version="1" comment="libmpfr4 is &lt;3.1.2-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105814" version="1" comment="libmpfr4 is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514813" version="1" comment="libpng16-16 is &lt;1.6.8-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514814" version="1" comment="libpng16-16-32bit is &lt;1.6.8-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333964" version="1" comment="libpng12 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514937" version="1" comment="libsndfile1 is &lt;1.0.25-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514938" version="1" comment="libsndfile1-32bit is &lt;1.0.25-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516342" version="1" comment="rsync is &lt;3.1.0-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514579" version="1" comment="libmspack0 is &lt;0.4-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515061" version="1" comment="xdg-utils is &lt;20140630-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106065" version="1" comment="xdg-utils is &lt;20140630-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177962" version="1" comment="xdg-utils is &lt;20140630-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515352" version="1" comment="unzip is &lt;6.00-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520123" version="1" comment="unzip is &lt;6.00-33.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514742" version="1" comment="vorbis-tools is &lt;1.4.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514743" version="1" comment="vorbis-tools-lang is &lt;1.4.0-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515380" version="1" comment="vorbis-tools is &lt;1.4.0-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515381" version="1" comment="vorbis-tools-lang is &lt;1.4.0-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514936" version="1" comment="busybox is &lt;1.21.1-3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113975" version="1" comment="busybox is &lt;1.21.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514555" version="1" comment="icu is &lt;52.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514556" version="1" comment="libicu52_1 is &lt;52.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514557" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514558" version="1" comment="libicu52_1-data is &lt;52.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107566" version="1" comment="icu is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107572" version="1" comment="libicu52_1 is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107571" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107573" version="1" comment="libicu52_1-data is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561620" version="1" comment="ft2demos is &lt;2.5.5-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561621" version="1" comment="libfreetype6 is &lt;2.5.5-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561622" version="1" comment="libfreetype6-32bit is &lt;2.5.5-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514566" version="1" comment="cups is &lt;1.7.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514567" version="1" comment="cups-client is &lt;1.7.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514568" version="1" comment="cups-libs is &lt;1.7.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514569" version="1" comment="cups-libs-32bit is &lt;1.7.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516652" version="1" comment="sudo is &lt;1.8.10p3-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515729" version="1" comment="ecryptfs-utils is &lt;103-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515730" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514687" version="1" comment="gd is &lt;2.1.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514688" version="1" comment="gd-32bit is &lt;2.1.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515443" version="1" comment="kernel-default is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515444" version="1" comment="kernel-default-devel is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515445" version="1" comment="kernel-default-extra is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515446" version="1" comment="kernel-devel is &lt;3.12.60-52.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515447" version="1" comment="kernel-macros is &lt;3.12.60-52.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515448" version="1" comment="kernel-source is &lt;3.12.60-52.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515449" version="1" comment="kernel-syms is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515450" version="1" comment="kernel-xen is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515451" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516216" version="1" comment="kernel-default is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516217" version="1" comment="kernel-default-devel is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516218" version="1" comment="kernel-default-extra is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516219" version="1" comment="kernel-devel is &lt;3.12.59-60.41.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516220" version="1" comment="kernel-macros is &lt;3.12.59-60.41.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516221" version="1" comment="kernel-source is &lt;3.12.59-60.41.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516222" version="1" comment="kernel-syms is &lt;3.12.59-60.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516223" version="1" comment="kernel-xen is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516224" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515948" version="1" comment="python-backports.ssl_match_hostname is &lt;3.4.0.2-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515949" version="1" comment="python-tornado is &lt;4.2.1-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514967" version="1" comment="libzmq3 is &lt;4.0.4-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514847" version="1" comment="kernel-default is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514848" version="1" comment="kernel-default-devel is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514849" version="1" comment="kernel-default-extra is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514850" version="1" comment="kernel-devel is &lt;3.12.44-52.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514851" version="1" comment="kernel-macros is &lt;3.12.44-52.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514852" version="1" comment="kernel-source is &lt;3.12.44-52.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514853" version="1" comment="kernel-syms is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514854" version="1" comment="kernel-xen is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514855" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515768" version="1" comment="libmspack0 is &lt;0.4-14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515282" version="1" comment="libsndfile1 is &lt;1.0.25-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515283" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515782" version="1" comment="glibc is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515783" version="1" comment="glibc-32bit is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515784" version="1" comment="glibc-devel is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515785" version="1" comment="glibc-devel-32bit is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515786" version="1" comment="glibc-i18ndata is &lt;2.19-22.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515787" version="1" comment="glibc-locale is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515788" version="1" comment="glibc-locale-32bit is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515789" version="1" comment="nscd is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516844" version="1" comment="glibc is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516845" version="1" comment="glibc-32bit is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516846" version="1" comment="glibc-devel is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516847" version="1" comment="glibc-devel-32bit is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516848" version="1" comment="glibc-i18ndata is &lt;2.19-35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516849" version="1" comment="glibc-locale is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516850" version="1" comment="glibc-locale-32bit is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516851" version="1" comment="nscd is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516043" version="1" comment="libgudev-1_0-0 is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516044" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516045" version="1" comment="libudev1 is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516046" version="1" comment="libudev1-32bit is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516047" version="1" comment="systemd is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516048" version="1" comment="systemd-32bit is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516049" version="1" comment="systemd-bash-completion is &lt;210-70.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516050" version="1" comment="systemd-sysvinit is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516051" version="1" comment="udev is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517012" version="1" comment="libgudev-1_0-0 is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517013" version="1" comment="libgudev-1_0-0-32bit is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517014" version="1" comment="libudev1 is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517015" version="1" comment="libudev1-32bit is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517016" version="1" comment="systemd is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517017" version="1" comment="systemd-32bit is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517018" version="1" comment="systemd-bash-completion is &lt;210-104.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517019" version="1" comment="systemd-sysvinit is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517020" version="1" comment="udev is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516251" version="1" comment="ImageMagick is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516252" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516253" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516254" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516255" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516767" version="1" comment="ImageMagick is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516768" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516769" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516770" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516771" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516324" version="1" comment="kernel-default is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516325" version="1" comment="kernel-default-devel is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516326" version="1" comment="kernel-default-extra is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516327" version="1" comment="kernel-devel is &lt;3.12.62-60.62.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516328" version="1" comment="kernel-macros is &lt;3.12.62-60.62.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516329" version="1" comment="kernel-source is &lt;3.12.62-60.62.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516330" version="1" comment="kernel-syms is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516331" version="1" comment="kernel-xen is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516332" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516608" version="1" comment="ImageMagick is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516609" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516610" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516611" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516612" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518377" version="1" comment="binutils is &lt;2.29.1-9.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520243" version="1" comment="binutils is &lt;2.31-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512049" version="1" comment="binutils is &lt;2.31-9.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514599" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514600" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514601" version="1" comment="openssl is &lt;1.0.1i-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515735" version="1" comment="libvirt is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515736" version="1" comment="libvirt-client is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515737" version="1" comment="libvirt-client-32bit is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515738" version="1" comment="libvirt-daemon is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515739" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515740" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515741" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515742" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515743" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515744" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515745" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515746" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515747" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515748" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515749" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515750" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515751" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515752" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515753" version="1" comment="libvirt-doc is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515304" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515305" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515306" version="1" comment="libdcerpc0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515307" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515308" version="1" comment="libgensec0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515309" version="1" comment="libgensec0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515310" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515311" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515312" version="1" comment="libndr-nbt0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515313" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515314" version="1" comment="libndr-standard0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515315" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515316" version="1" comment="libndr0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515317" version="1" comment="libndr0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515318" version="1" comment="libnetapi0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515319" version="1" comment="libnetapi0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515320" version="1" comment="libpdb0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515321" version="1" comment="libpdb0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515322" version="1" comment="libregistry0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515323" version="1" comment="libsamba-credentials0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515324" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515325" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515326" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515327" version="1" comment="libsamba-util0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515328" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515329" version="1" comment="libsamdb0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515330" version="1" comment="libsamdb0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515331" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515332" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515333" version="1" comment="libsmbclient0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515334" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515335" version="1" comment="libsmbconf0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515336" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515337" version="1" comment="libsmbldap0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515338" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515339" version="1" comment="libtevent-util0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515340" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515341" version="1" comment="libwbclient0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515342" version="1" comment="libwbclient0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515343" version="1" comment="samba is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515344" version="1" comment="samba-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515345" version="1" comment="samba-client is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515346" version="1" comment="samba-client-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515347" version="1" comment="samba-doc is &lt;4.1.12-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515348" version="1" comment="samba-libs is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515349" version="1" comment="samba-libs-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515350" version="1" comment="samba-winbind is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515351" version="1" comment="samba-winbind-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514562" version="1" comment="dbus-1 is &lt;1.8.16-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514563" version="1" comment="dbus-1-x11 is &lt;1.8.16-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514564" version="1" comment="libdbus-1-3 is &lt;1.8.16-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514565" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514859" version="1" comment="e2fsprogs is &lt;1.42.11-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514860" version="1" comment="libcom_err2 is &lt;1.42.11-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514861" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514862" version="1" comment="libext2fs2 is &lt;1.42.11-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113256" version="1" comment="e2fsprogs is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113260" version="1" comment="libcom_err2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113261" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113264" version="1" comment="libext2fs2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158971" version="1" comment="e2fsprogs is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158972" version="1" comment="libcom_err2 is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158973" version="1" comment="libcom_err2-32bit is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158974" version="1" comment="libext2fs2 is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512114" version="1" comment="e2fsprogs is &lt;1.43.8-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512115" version="1" comment="libcom_err2 is &lt;1.43.8-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512116" version="1" comment="libcom_err2-32bit is &lt;1.43.8-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512117" version="1" comment="libext2fs2 is &lt;1.43.8-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514604" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514605" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514718" version="1" comment="libfltk1 is &lt;1.3.2-10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514719" version="1" comment="tigervnc is &lt;1.4.1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514720" version="1" comment="xorg-x11-Xvnc is &lt;1.4.1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514543" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514544" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515359" version="1" comment="kernel-default is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515360" version="1" comment="kernel-default-devel is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515361" version="1" comment="kernel-default-extra is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515362" version="1" comment="kernel-devel is &lt;3.12.51-52.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515363" version="1" comment="kernel-macros is &lt;3.12.51-52.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515364" version="1" comment="kernel-source is &lt;3.12.51-52.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515365" version="1" comment="kernel-syms is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515366" version="1" comment="kernel-xen is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515367" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561627" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561628" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514926" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514927" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514928" version="1" comment="openssl is &lt;1.0.1i-27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514655" version="1" comment="gnutls is &lt;3.2.15-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514656" version="1" comment="libgnutls28 is &lt;3.2.15-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514657" version="1" comment="libgnutls28-32bit is &lt;3.2.15-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514917" version="1" comment="libQt5Core5 is &lt;5.3.1-4.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514918" version="1" comment="libQt5DBus5 is &lt;5.3.1-4.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514919" version="1" comment="libQt5Gui5 is &lt;5.3.1-4.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514920" version="1" comment="libQt5Widgets5 is &lt;5.3.1-4.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514871" version="1" comment="libqt4 is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514872" version="1" comment="libqt4-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514873" version="1" comment="libqt4-qt3support is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514874" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514875" version="1" comment="libqt4-sql is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514876" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514877" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514878" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514879" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514880" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514881" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514882" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514883" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514884" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514885" version="1" comment="libqt4-x11 is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514886" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141900" version="1" comment="libQt5Core5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141901" version="1" comment="libQt5DBus5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141902" version="1" comment="libQt5Gui5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141903" version="1" comment="libQt5Widgets5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140721" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140722" version="1" comment="libQt5Core5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140723" version="1" comment="libQt5DBus5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140724" version="1" comment="libQt5Gui5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140725" version="1" comment="libQt5Network5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140726" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140727" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140728" version="1" comment="libQt5Sql5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140729" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140730" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140731" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140732" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140733" version="1" comment="libQt5Test5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140734" version="1" comment="libQt5Widgets5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140735" version="1" comment="libQt5Xml5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159044" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159045" version="1" comment="libQt5Core5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159046" version="1" comment="libQt5DBus5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159047" version="1" comment="libQt5Gui5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159048" version="1" comment="libQt5Network5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159049" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159050" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159051" version="1" comment="libQt5Sql5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159052" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159053" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159054" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159055" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159056" version="1" comment="libQt5Test5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159057" version="1" comment="libQt5Widgets5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159058" version="1" comment="libQt5Xml5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512213" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512214" version="1" comment="libQt5Core5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512215" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512216" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512217" version="1" comment="libQt5Network5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512218" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512219" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512220" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512221" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512222" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512223" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512224" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512225" version="1" comment="libQt5Test5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512226" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512227" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334271" version="1" comment="texlive is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514683" version="1" comment="flash-player is &lt;11.2.202.429-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514684" version="1" comment="flash-player-gnome is &lt;11.2.202.429-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514929" version="1" comment="flash-player is &lt;11.2.202.438-27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514930" version="1" comment="flash-player-gnome is &lt;11.2.202.438-27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514931" version="1" comment="flash-player is &lt;11.2.202.440-31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514932" version="1" comment="flash-player-gnome is &lt;11.2.202.440-31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514996" version="1" comment="flash-player is &lt;11.2.202.442-67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514997" version="1" comment="flash-player-gnome is &lt;11.2.202.442-67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514575" version="1" comment="flash-player is &lt;11.2.202.451-77.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514576" version="1" comment="flash-player-gnome is &lt;11.2.202.451-77.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514653" version="1" comment="flash-player is &lt;11.2.202.457-80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514654" version="1" comment="flash-player-gnome is &lt;11.2.202.457-80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514665" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.79-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514666" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.79-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515279" version="1" comment="wireshark is &lt;1.10.12-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514619" version="1" comment="kernel-default is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514620" version="1" comment="kernel-default-devel is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514621" version="1" comment="kernel-default-extra is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514622" version="1" comment="kernel-devel is &lt;3.12.39-47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514623" version="1" comment="kernel-macros is &lt;3.12.39-47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514624" version="1" comment="kernel-source is &lt;3.12.39-47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514625" version="1" comment="kernel-syms is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514626" version="1" comment="kernel-xen is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514627" version="1" comment="kernel-xen-devel is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515291" version="1" comment="dracut is &lt;037-51.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514735" version="1" comment="MozillaFirefox is &lt;31.7.0esr-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514736" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514721" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514722" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514723" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514724" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514725" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514726" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514727" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514728" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514729" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514730" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514731" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514732" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514733" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334064" version="1" comment="gstreamer-plugins-bad is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109841" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109845" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109846" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109847" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109848" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109849" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109850" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109852" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109853" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109854" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109855" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109856" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109857" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142113" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142114" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142115" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142116" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142117" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142118" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142119" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142120" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142121" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142122" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142123" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142124" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142125" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147825" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147829" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147830" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147831" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147832" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147833" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147834" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147836" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147837" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147838" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147839" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147840" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147841" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333936" version="1" comment="MozillaFirefox is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514651" version="1" comment="MozillaFirefox is &lt;31.6.0esr-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514652" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514610" version="1" comment="MozillaFirefox is &lt;31.5.3esr-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514611" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514553" version="1" comment="MozillaFirefox is &lt;31.5.0esr-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514554" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514970" version="1" comment="libgcrypt20 is &lt;1.6.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514971" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141153" version="1" comment="update-alternatives is &lt;1.18.4-14.216" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114120" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517312" version="1" comment="update-alternatives is &lt;1.16.10-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514933" version="1" comment="p7zip is &lt;9.20.1-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113958" version="1" comment="p7zip is &lt;9.20.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128891" version="1" comment="p7zip is &lt;9.20.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171463" version="1" comment="p7zip is &lt;9.20.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519012" version="1" comment="kernel-firmware is &lt;20170530-21.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519013" version="1" comment="ucode-amd is &lt;20170530-21.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514630" version="1" comment="pigz is &lt;2.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108432" version="1" comment="pigz is &lt;2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514744" version="1" comment="patch is &lt;2.7.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520972" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177330" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516066" version="1" comment="expat is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516067" version="1" comment="libexpat1 is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516068" version="1" comment="libexpat1-32bit is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333999" version="1" comment="NetworkManager is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333967" version="1" comment="grep is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514801" version="1" comment="bind-libs is &lt;9.9.6P1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514802" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514803" version="1" comment="bind-utils is &lt;9.9.6P1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517382" version="1" comment="kernel-default is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517383" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517384" version="1" comment="kernel-default-extra is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517385" version="1" comment="kernel-devel is &lt;3.12.74-60.64.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517386" version="1" comment="kernel-macros is &lt;3.12.74-60.64.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517387" version="1" comment="kernel-source is &lt;3.12.74-60.64.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517388" version="1" comment="kernel-syms is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517389" version="1" comment="kernel-xen is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517390" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518683" version="1" comment="kernel-default is &lt;4.4.38-93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518684" version="1" comment="kernel-default-devel is &lt;4.4.38-93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518685" version="1" comment="kernel-default-extra is &lt;4.4.38-93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518686" version="1" comment="kernel-devel is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518687" version="1" comment="kernel-macros is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518688" version="1" comment="kernel-source is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518689" version="1" comment="kernel-syms is &lt;4.4.38-93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334374" version="1" comment="facter is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514779" version="1" comment="libldap-2_4-2 is &lt;2.4.39-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514780" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.39-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514781" version="1" comment="openldap2-client is &lt;2.4.39-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140870" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140871" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140874" version="1" comment="openldap2-client is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156765" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156766" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156768" version="1" comment="openldap2-client is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512344" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512345" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512346" version="1" comment="openldap2-client is &lt;2.4.41-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515353" version="1" comment="gpg2 is &lt;2.0.24-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515354" version="1" comment="gpg2-lang is &lt;2.0.24-3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514693" version="1" comment="qemu is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514694" version="1" comment="qemu-block-curl is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514695" version="1" comment="qemu-ipxe is &lt;1.0.0-46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514696" version="1" comment="qemu-kvm is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514697" version="1" comment="qemu-seabios is &lt;1.7.4-46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514698" version="1" comment="qemu-sgabios is &lt;8-46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514699" version="1" comment="qemu-tools is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514700" version="1" comment="qemu-vgabios is &lt;1.7.4-46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514701" version="1" comment="qemu-x86 is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514631" version="1" comment="libssh2-1 is &lt;1.4.3-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514632" version="1" comment="libssh2-1-32bit is &lt;1.4.3-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108425" version="1" comment="libssh2-1 is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108426" version="1" comment="libssh2-1-32bit is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140952" version="1" comment="libssh2-1 is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140953" version="1" comment="libssh2-1-32bit is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514789" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514790" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514786" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514787" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514788" version="1" comment="openssl is &lt;1.0.1i-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514685" version="1" comment="ntp is &lt;4.2.6p5-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514686" version="1" comment="ntp-doc is &lt;4.2.6p5-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514646" version="1" comment="libXfont1 is &lt;1.4.7-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561631" version="1" comment="libXfont1 is &lt;1.4.7-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515807" version="1" comment="libxml2-2 is &lt;2.9.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515808" version="1" comment="libxml2-2-32bit is &lt;2.9.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515809" version="1" comment="libxml2-tools is &lt;2.9.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515810" version="1" comment="python-libxml2 is &lt;2.9.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334243" version="1" comment="xdg-utils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516300" version="1" comment="libidn11 is &lt;1.28-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516301" version="1" comment="libidn11-32bit is &lt;1.28-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516356" version="1" comment="wget is &lt;1.14-10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130989" version="1" comment="libidn11 is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130990" version="1" comment="libidn11-32bit is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174162" version="1" comment="libidn11 is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174163" version="1" comment="libidn11-32bit is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514691" version="1" comment="clamav is &lt;0.98.7-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333947" version="1" comment="wireshark is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514618" version="1" comment="wireshark is &lt;1.10.13-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514667" version="1" comment="cups-filters is &lt;1.0.58-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514668" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514669" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514670" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517021" version="1" comment="python-requests is &lt;2.8.1-6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516653" version="1" comment="libarchive13 is &lt;3.1.2-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514628" version="1" comment="libzip2 is &lt;0.11.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514845" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514846" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.85-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141888" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141889" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130962" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130963" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156235" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156236" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512192" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512193" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338878" version="1" comment="librest is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515131" version="1" comment="krb5 is &lt;1.12.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515132" version="1" comment="krb5-32bit is &lt;1.12.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515133" version="1" comment="krb5-client is &lt;1.12.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515382" version="1" comment="krb5 is &lt;1.12.1-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515383" version="1" comment="krb5-32bit is &lt;1.12.1-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515384" version="1" comment="krb5-client is &lt;1.12.1-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514815" version="1" comment="MozillaFirefox is &lt;31.8.0esr-37.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514816" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-37.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514817" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514818" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514819" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514820" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514821" version="1" comment="mozilla-nspr is &lt;4.10.8-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514822" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514823" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514824" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514825" version="1" comment="mozilla-nss-certs is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514826" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514827" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514705" version="1" comment="xen is &lt;4.4.2_04-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514706" version="1" comment="xen-kmp-default is &lt;4.4.2_04_k3.12.39_47-18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514707" version="1" comment="xen-libs is &lt;4.4.2_04-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514708" version="1" comment="xen-libs-32bit is &lt;4.4.2_04-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514647" version="1" comment="xen is &lt;4.4.2_02-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514648" version="1" comment="xen-kmp-default is &lt;4.4.2_02_k3.12.38_44-15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514649" version="1" comment="xen-libs is &lt;4.4.2_02-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514650" version="1" comment="xen-libs-32bit is &lt;4.4.2_02-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514702" version="1" comment="libtasn1 is &lt;3.7-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514703" version="1" comment="libtasn1-6 is &lt;3.7-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514704" version="1" comment="libtasn1-6-32bit is &lt;3.7-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142074" version="1" comment="NetworkManager is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142075" version="1" comment="NetworkManager-lang is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140431" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140432" version="1" comment="libnm-glib4 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140433" version="1" comment="libnm-util2 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140434" version="1" comment="libnm0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142076" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140435" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140436" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159624" version="1" comment="NetworkManager is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159625" version="1" comment="NetworkManager-lang is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159169" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159170" version="1" comment="libnm-glib4 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159171" version="1" comment="libnm-util2 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159172" version="1" comment="libnm0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159626" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159173" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159174" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512013" version="1" comment="NetworkManager is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512014" version="1" comment="NetworkManager-lang is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512015" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512016" version="1" comment="libnm-glib4 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512017" version="1" comment="libnm-util2 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512018" version="1" comment="libnm0 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512019" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512020" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512021" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516145" version="1" comment="kernel-default is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516146" version="1" comment="kernel-default-devel is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516147" version="1" comment="kernel-default-extra is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516148" version="1" comment="kernel-devel is &lt;3.12.51-60.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516149" version="1" comment="kernel-macros is &lt;3.12.51-60.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516150" version="1" comment="kernel-source is &lt;3.12.51-60.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516151" version="1" comment="kernel-syms is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516152" version="1" comment="kernel-xen is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516153" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514689" version="1" comment="flash-player is &lt;11.2.202.460-83.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514690" version="1" comment="flash-player-gnome is &lt;11.2.202.460-83.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514761" version="1" comment="flash-player is &lt;11.2.202.466-86.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514762" version="1" comment="flash-player-gnome is &lt;11.2.202.466-86.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514905" version="1" comment="flash-player is &lt;11.2.202.508-99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514906" version="1" comment="flash-player-gnome is &lt;11.2.202.508-99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514784" version="1" comment="flash-player is &lt;11.2.202.468-89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514785" version="1" comment="flash-player-gnome is &lt;11.2.202.468-89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333975" version="1" comment="tcpdump is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514738" version="1" comment="curl is &lt;7.37.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514739" version="1" comment="libcurl4 is &lt;7.37.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514740" version="1" comment="libcurl4-32bit is &lt;7.37.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515036" version="1" comment="libssh4 is &lt;0.6.3-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514809" version="1" comment="libecpg6 is &lt;9.3.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514810" version="1" comment="libpq5 is &lt;9.3.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514811" version="1" comment="libpq5-32bit is &lt;9.3.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514812" version="1" comment="postgresql93 is &lt;9.3.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515375" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515376" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515377" version="1" comment="openssl is &lt;1.0.1i-27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516142" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516143" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516144" version="1" comment="openssl is &lt;1.0.1i-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514541" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514542" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515803" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515804" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515799" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515800" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515801" version="1" comment="openssl is &lt;1.0.1i-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516864" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516865" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516866" version="1" comment="openssl is &lt;1.0.1i-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514768" version="1" comment="fuse is &lt;2.9.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514769" version="1" comment="libfuse2 is &lt;2.9.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514972" version="1" comment="qemu is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514973" version="1" comment="qemu-block-curl is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514974" version="1" comment="qemu-ipxe is &lt;1.0.0-48.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514975" version="1" comment="qemu-kvm is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514976" version="1" comment="qemu-seabios is &lt;1.7.4-48.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514977" version="1" comment="qemu-sgabios is &lt;8-48.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514978" version="1" comment="qemu-tools is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514979" version="1" comment="qemu-vgabios is &lt;1.7.4-48.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514980" version="1" comment="qemu-x86 is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514757" version="1" comment="xen is &lt;4.4.2_06-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514758" version="1" comment="xen-kmp-default is &lt;4.4.2_06_k3.12.39_47-21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514759" version="1" comment="xen-libs is &lt;4.4.2_06-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514760" version="1" comment="xen-libs-32bit is &lt;4.4.2_06-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515105" version="1" comment="libpolkit0 is &lt;0.113-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515106" version="1" comment="libpolkit0-32bit is &lt;0.113-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515107" version="1" comment="polkit is &lt;0.113-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515108" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515385" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515386" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515387" version="1" comment="libdcerpc0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515388" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515389" version="1" comment="libgensec0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515390" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515391" version="1" comment="libldb1 is &lt;1.1.24-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515392" version="1" comment="libldb1-32bit is &lt;1.1.24-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515393" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515394" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515395" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515396" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515397" version="1" comment="libndr-standard0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515398" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515399" version="1" comment="libndr0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515400" version="1" comment="libndr0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515401" version="1" comment="libnetapi0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515402" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515403" version="1" comment="libpdb0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515404" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515405" version="1" comment="libregistry0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515406" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515407" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515408" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515409" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515410" version="1" comment="libsamba-util0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515411" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515412" version="1" comment="libsamdb0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515413" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515414" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515415" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515416" version="1" comment="libsmbclient0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515417" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515418" version="1" comment="libsmbconf0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515419" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515420" version="1" comment="libsmbldap0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515421" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515422" version="1" comment="libtalloc2 is &lt;2.1.5-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515423" version="1" comment="libtalloc2-32bit is &lt;2.1.5-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515424" version="1" comment="libtdb1 is &lt;1.3.8-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515425" version="1" comment="libtdb1-32bit is &lt;1.3.8-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515426" version="1" comment="libtevent-util0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515427" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515428" version="1" comment="libtevent0 is &lt;0.9.26-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515429" version="1" comment="libtevent0-32bit is &lt;0.9.26-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515430" version="1" comment="libwbclient0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515431" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515432" version="1" comment="pytalloc is &lt;2.1.5-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515433" version="1" comment="pytalloc-32bit is &lt;2.1.5-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515434" version="1" comment="samba is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515435" version="1" comment="samba-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515436" version="1" comment="samba-client is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515437" version="1" comment="samba-client-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515438" version="1" comment="samba-doc is &lt;4.1.12-18.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515439" version="1" comment="samba-libs is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515440" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515441" version="1" comment="samba-winbind is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515442" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516154" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516155" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516156" version="1" comment="libdcerpc0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516157" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516158" version="1" comment="libgensec0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516159" version="1" comment="libgensec0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516160" version="1" comment="libldb1 is &lt;1.1.24-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516161" version="1" comment="libldb1-32bit is &lt;1.1.24-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516162" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516163" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516164" version="1" comment="libndr-nbt0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516165" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516166" version="1" comment="libndr-standard0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516167" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516168" version="1" comment="libndr0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516169" version="1" comment="libndr0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516170" version="1" comment="libnetapi0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516171" version="1" comment="libnetapi0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516172" version="1" comment="libregistry0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516173" version="1" comment="libsamba-credentials0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516174" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516175" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516176" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516177" version="1" comment="libsamba-passdb0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516178" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516179" version="1" comment="libsamba-util0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516180" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516181" version="1" comment="libsamdb0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516182" version="1" comment="libsamdb0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516183" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516184" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516185" version="1" comment="libsmbclient0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516186" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516187" version="1" comment="libsmbconf0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516188" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516189" version="1" comment="libsmbldap0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516190" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516191" version="1" comment="libtalloc2 is &lt;2.1.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516192" version="1" comment="libtalloc2-32bit is &lt;2.1.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516193" version="1" comment="libtdb1 is &lt;1.3.8-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516194" version="1" comment="libtdb1-32bit is &lt;1.3.8-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516195" version="1" comment="libtevent-util0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516196" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516197" version="1" comment="libtevent0 is &lt;0.9.26-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516198" version="1" comment="libtevent0-32bit is &lt;0.9.26-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516199" version="1" comment="libwbclient0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516200" version="1" comment="libwbclient0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516201" version="1" comment="pytalloc is &lt;2.1.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516202" version="1" comment="pytalloc-32bit is &lt;2.1.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516203" version="1" comment="samba is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516204" version="1" comment="samba-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516205" version="1" comment="samba-client is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516206" version="1" comment="samba-client-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516207" version="1" comment="samba-doc is &lt;4.2.4-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516208" version="1" comment="samba-libs is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516209" version="1" comment="samba-libs-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516210" version="1" comment="samba-winbind is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516211" version="1" comment="samba-winbind-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140715" version="1" comment="libldb1 is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140716" version="1" comment="libldb1-32bit is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159154" version="1" comment="libldb1 is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159155" version="1" comment="libldb1-32bit is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512347" version="1" comment="libldb1 is &lt;1.1.29-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512348" version="1" comment="libldb1-32bit is &lt;1.1.29-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515909" version="1" comment="ghostscript is &lt;9.15-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515910" version="1" comment="ghostscript-x11 is &lt;9.15-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125321" version="1" comment="ghostscript is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125322" version="1" comment="ghostscript-x11 is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517449" version="1" comment="pam is &lt;1.1.8-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517450" version="1" comment="pam-32bit is &lt;1.1.8-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517451" version="1" comment="pam-doc is &lt;1.1.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521604" version="1" comment="libunwind is &lt;1.1-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519800" version="1" comment="rsyslog is &lt;8.24.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515060" version="1" comment="libspice-server1 is &lt;0.12.4-8.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514907" version="1" comment="cups-filters is &lt;1.0.58-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514908" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514909" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514910" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514838" version="1" comment="xen is &lt;4.4.2_08-22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514839" version="1" comment="xen-kmp-default is &lt;4.4.2_08_k3.12.43_52.6-22.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514840" version="1" comment="xen-libs is &lt;4.4.2_08-22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514841" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516212" version="1" comment="xen is &lt;4.5.2_02-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516213" version="1" comment="xen-kmp-default is &lt;4.5.2_02_k3.12.49_11-4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516214" version="1" comment="xen-libs is &lt;4.5.2_02-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516215" version="1" comment="xen-libs-32bit is &lt;4.5.2_02-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338881" version="1" comment="mozilla-nss is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514737" version="1" comment="dnsmasq is &lt;2.71-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141859" version="1" comment="dnsmasq is &lt;2.71-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140541" version="1" comment="dnsmasq is &lt;2.71-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158964" version="1" comment="dnsmasq is &lt;2.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164846" version="1" comment="dnsmasq is &lt;2.78-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517109" version="1" comment="ppp is &lt;2.4.7-3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514935" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113959" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169826" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514981" version="1" comment="gnutls is &lt;3.2.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514982" version="1" comment="libgnutls28 is &lt;3.2.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514983" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516106" version="1" comment="libtasn1 is &lt;3.7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516107" version="1" comment="libtasn1-6 is &lt;3.7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516108" version="1" comment="libtasn1-6-32bit is &lt;3.7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514767" version="1" comment="wireshark is &lt;1.10.14-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515037" version="1" comment="wireshark is &lt;1.12.7-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518042" version="1" comment="libraw9 is &lt;0.15.4-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333984" version="1" comment="strongswan is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515720" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515721" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515722" version="1" comment="openldap2-client is &lt;2.4.41-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514987" version="1" comment="openssh is &lt;6.6p1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514988" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514989" version="1" comment="openssh-helpers is &lt;6.6p1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515772" version="1" comment="socat is &lt;1.7.2.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338883" version="1" comment="xz is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515134" version="1" comment="xen is &lt;4.4.3_02-22.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515135" version="1" comment="xen-kmp-default is &lt;4.4.3_02_k3.12.48_52.27-22.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515136" version="1" comment="xen-libs is &lt;4.4.3_02-22.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515137" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-22.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515028" version="1" comment="coreutils is &lt;8.22-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515029" version="1" comment="coreutils-lang is &lt;8.22-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516416" version="1" comment="wpa_supplicant is &lt;2.2-14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514796" version="1" comment="strongswan is &lt;5.1.3-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514797" version="1" comment="strongswan-doc is &lt;5.1.3-18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514798" version="1" comment="strongswan-ipsec is &lt;5.1.3-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514799" version="1" comment="strongswan-libs0 is &lt;5.1.3-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514939" version="1" comment="MozillaFirefox is &lt;38.2.1esr-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514940" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514941" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514942" version="1" comment="libfreebl3 is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514943" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514944" version="1" comment="libsoftokn3 is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514945" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514946" version="1" comment="mozilla-nss is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514947" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514948" version="1" comment="mozilla-nss-certs is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514949" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514950" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515368" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515369" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515370" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515371" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515372" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515373" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519845" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519846" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519847" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519848" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519849" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519850" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515030" version="1" comment="MozillaFirefox is &lt;38.3.0esr-48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515031" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515032" version="1" comment="mozilla-nspr is &lt;4.10.9-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515033" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515265" version="1" comment="MozillaFirefox is &lt;38.4.0esr-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515266" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515267" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515268" version="1" comment="libfreebl3 is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515269" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515270" version="1" comment="libsoftokn3 is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515271" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515272" version="1" comment="mozilla-nspr is &lt;4.10.10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515273" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515274" version="1" comment="mozilla-nss is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515275" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515276" version="1" comment="mozilla-nss-certs is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515277" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515278" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515127" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515128" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516058" version="1" comment="libmysqlclient18 is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516059" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516060" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516061" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516062" version="1" comment="mariadb is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516063" version="1" comment="mariadb-client is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516064" version="1" comment="mariadb-errormessages is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516740" version="1" comment="libmysqlclient18 is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516741" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516742" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516743" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516744" version="1" comment="mariadb is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516745" version="1" comment="mariadb-client is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516746" version="1" comment="mariadb-errormessages is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515733" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515734" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.95-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514807" version="1" comment="flash-player is &lt;11.2.202.491-96.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514808" version="1" comment="flash-player-gnome is &lt;11.2.202.491-96.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515038" version="1" comment="kernel-default is &lt;3.12.48-52.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515039" version="1" comment="kernel-default-devel is &lt;3.12.48-52.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515040" version="1" comment="kernel-default-extra is &lt;3.12.48-52.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515041" version="1" comment="kernel-devel is &lt;3.12.48-52.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515042" version="1" comment="kernel-macros is &lt;3.12.48-52.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515043" version="1" comment="kernel-source is &lt;3.12.48-52.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515044" version="1" comment="kernel-syms is &lt;3.12.48-52.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515045" version="1" comment="kernel-xen is &lt;3.12.48-52.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515046" version="1" comment="kernel-xen-devel is &lt;3.12.48-52.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333988" version="1" comment="qemu is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514913" version="1" comment="xen is &lt;4.4.2_10-22.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514914" version="1" comment="xen-kmp-default is &lt;4.4.2_10_k3.12.44_52.10-22.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514915" version="1" comment="xen-libs is &lt;4.4.2_10-22.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514916" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-22.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521925" version="1" comment="glibc is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521926" version="1" comment="glibc-32bit is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521927" version="1" comment="glibc-devel is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521928" version="1" comment="glibc-devel-32bit is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521929" version="1" comment="glibc-i18ndata is &lt;2.22-100.15.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521930" version="1" comment="glibc-locale is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521931" version="1" comment="glibc-locale-32bit is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521932" version="1" comment="nscd is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515303" version="1" comment="sblim-sfcb is &lt;1.4.8-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141124" version="1" comment="sblim-sfcb is &lt;1.4.8-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159305" version="1" comment="sblim-sfcb is &lt;1.4.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512618" version="1" comment="sblim-sfcb is &lt;1.4.8-17.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333990" version="1" comment="audit is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521142" version="1" comment="audit is &lt;2.8.1-8.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521143" version="1" comment="libaudit1 is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521144" version="1" comment="libaudit1-32bit is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521145" version="1" comment="libauparse0 is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522481" version="1" comment="audit is &lt;2.8.1-10.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522482" version="1" comment="libaudit1 is &lt;2.8.1-10.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522483" version="1" comment="libaudit1-32bit is &lt;2.8.1-10.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522484" version="1" comment="libauparse0 is &lt;2.8.1-10.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517168" version="1" comment="libvmtools0 is &lt;10.1.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517169" version="1" comment="open-vm-tools is &lt;10.1.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517170" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518489" version="1" comment="libvmtools0 is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518490" version="1" comment="open-vm-tools is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518491" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159247" version="1" comment="libvmtools0 is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159248" version="1" comment="open-vm-tools is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159249" version="1" comment="open-vm-tools-desktop is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512527" version="1" comment="libvmtools0 is &lt;10.3.0-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512528" version="1" comment="open-vm-tools is &lt;10.3.0-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512529" version="1" comment="open-vm-tools-desktop is &lt;10.3.0-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515129" version="1" comment="libvdpau1 is &lt;0.8-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515130" version="1" comment="libvdpau1-32bit is &lt;0.8-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115565" version="1" comment="libvdpau1 is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115566" version="1" comment="libvdpau1-32bit is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140976" version="1" comment="libvdpau1 is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142145" version="1" comment="libvdpau1-32bit is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561634" version="1" comment="bash-completion is &lt;2.1-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561635" version="1" comment="libblkid1 is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561636" version="1" comment="libblkid1-32bit is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561637" version="1" comment="libmount1 is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561638" version="1" comment="libmount1-32bit is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561639" version="1" comment="libsmartcols1 is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561640" version="1" comment="libuuid-devel is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561641" version="1" comment="libuuid1 is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561642" version="1" comment="libuuid1-32bit is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561643" version="1" comment="python-libmount is &lt;2.25-24.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561644" version="1" comment="util-linux is &lt;2.25-24.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561645" version="1" comment="util-linux-lang is &lt;2.25-24.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561646" version="1" comment="util-linux-systemd is &lt;2.25-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561647" version="1" comment="uuidd is &lt;2.25-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516756" version="1" comment="ntp is &lt;4.2.8p9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516757" version="1" comment="ntp-doc is &lt;4.2.8p9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334326" version="1" comment="util-linux is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515034" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.1-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517022" version="1" comment="libspice-server1 is &lt;0.12.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515090" version="1" comment="cpp48 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515091" version="1" comment="gcc48 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515092" version="1" comment="gcc48-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515093" version="1" comment="gcc48-c++ is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515094" version="1" comment="gcc48-gij is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515095" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515096" version="1" comment="gcc48-info is &lt;4.8.5-24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515097" version="1" comment="libasan0 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515098" version="1" comment="libasan0-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515914" version="1" comment="libasan2 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515915" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515916" version="1" comment="libatomic1 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515917" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515918" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515919" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515920" version="1" comment="libffi4 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515921" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515922" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515923" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515099" version="1" comment="libgcj48 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515100" version="1" comment="libgcj48-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515101" version="1" comment="libgcj48-jar is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515102" version="1" comment="libgcj_bc1 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515924" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515925" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515926" version="1" comment="libgomp1 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515927" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515928" version="1" comment="libitm1 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515929" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515930" version="1" comment="liblsan0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515931" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515932" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515933" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515934" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515935" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515936" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515103" version="1" comment="libstdc++48-devel is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515104" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515937" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515938" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515939" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515940" version="1" comment="libtsan0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515941" version="1" comment="libubsan0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515942" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125716" version="1" comment="libasan2 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125717" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125723" version="1" comment="libffi4 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125724" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125734" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125735" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125736" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125737" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159062" version="1" comment="libasan2 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159063" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159064" version="1" comment="libffi4 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159065" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159066" version="1" comment="libmpx0 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159067" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159068" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159069" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561663" version="1" comment="libecpg6 is &lt;9.4.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561664" version="1" comment="libpq5 is &lt;9.4.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561665" version="1" comment="libpq5-32bit is &lt;9.4.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515088" version="1" comment="postgresql93 is &lt;9.3.10-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561666" version="1" comment="postgresql94 is &lt;9.4.5-4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333946" version="1" comment="sssd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516023" version="1" comment="ntp is &lt;4.2.8p6-46.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516024" version="1" comment="ntp-doc is &lt;4.2.8p6-46.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516025" version="1" comment="yast2-ntp-client is &lt;3.1.12.4-8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517002" version="1" comment="ntp is &lt;4.2.8p6-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517003" version="1" comment="ntp-doc is &lt;4.2.8p6-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517004" version="1" comment="yast2-ntp-client is &lt;3.1.22-6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514532" version="1" comment="xen is &lt;4.4.3_06-22.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514533" version="1" comment="xen-kmp-default is &lt;4.4.3_06_k3.12.48_52.27-22.15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514534" version="1" comment="xen-libs is &lt;4.4.3_06-22.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514535" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-22.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516922" version="1" comment="libvirt is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516923" version="1" comment="libvirt-client is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516924" version="1" comment="libvirt-client-32bit is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516925" version="1" comment="libvirt-daemon is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516926" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516927" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516928" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516929" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516930" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516931" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516932" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516933" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516934" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516935" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516936" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516937" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516938" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516939" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516940" version="1" comment="libvirt-doc is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515950" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515951" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515952" version="1" comment="libdcerpc0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515953" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515954" version="1" comment="libgensec0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515955" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515956" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515957" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515958" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515959" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515960" version="1" comment="libndr-standard0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515961" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515962" version="1" comment="libndr0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515963" version="1" comment="libndr0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515964" version="1" comment="libnetapi0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515965" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515966" version="1" comment="libregistry0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515967" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515968" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515969" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515970" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515971" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515972" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515973" version="1" comment="libsamba-util0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515974" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515975" version="1" comment="libsamdb0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515976" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515977" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515978" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515979" version="1" comment="libsmbclient0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515980" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515981" version="1" comment="libsmbconf0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515982" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515983" version="1" comment="libsmbldap0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515984" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515985" version="1" comment="libtevent-util0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515986" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515987" version="1" comment="libwbclient0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515988" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515989" version="1" comment="samba is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515990" version="1" comment="samba-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515991" version="1" comment="samba-client is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515992" version="1" comment="samba-client-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515993" version="1" comment="samba-doc is &lt;4.2.4-18.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515994" version="1" comment="samba-libs is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515995" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515996" version="1" comment="samba-winbind is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515997" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516952" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516953" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516954" version="1" comment="libdcerpc0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516955" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516956" version="1" comment="libgensec0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516957" version="1" comment="libgensec0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516958" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516959" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516960" version="1" comment="libndr-nbt0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516961" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516962" version="1" comment="libndr-standard0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516963" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516964" version="1" comment="libndr0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516965" version="1" comment="libndr0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516966" version="1" comment="libnetapi0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516967" version="1" comment="libnetapi0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516968" version="1" comment="libregistry0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516969" version="1" comment="libsamba-credentials0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516970" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516971" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516972" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516973" version="1" comment="libsamba-passdb0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516974" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516975" version="1" comment="libsamba-util0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516976" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516977" version="1" comment="libsamdb0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516978" version="1" comment="libsamdb0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516979" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516980" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516981" version="1" comment="libsmbclient0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516982" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516983" version="1" comment="libsmbconf0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516984" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516985" version="1" comment="libsmbldap0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516986" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516987" version="1" comment="libtevent-util0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516988" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516989" version="1" comment="libwbclient0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516990" version="1" comment="libwbclient0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516991" version="1" comment="samba is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516992" version="1" comment="samba-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516993" version="1" comment="samba-client is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516994" version="1" comment="samba-client-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516995" version="1" comment="samba-doc is &lt;4.2.4-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516996" version="1" comment="samba-libs is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516997" version="1" comment="samba-libs-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516998" version="1" comment="samba-winbind is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516999" version="1" comment="samba-winbind-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514842" version="1" comment="bind-libs is &lt;9.9.6P1-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514843" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514844" version="1" comment="bind-utils is &lt;9.9.6P1-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514998" version="1" comment="flash-player is &lt;11.2.202.521-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514999" version="1" comment="flash-player-gnome is &lt;11.2.202.521-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515062" version="1" comment="flash-player is &lt;11.2.202.535-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515063" version="1" comment="flash-player-gnome is &lt;11.2.202.535-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514991" version="1" comment="libsnmp30 is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514992" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514993" version="1" comment="net-snmp is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514994" version="1" comment="perl-SNMP is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514995" version="1" comment="snmp-mibs is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514953" version="1" comment="bind-libs is &lt;9.9.6P1-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514954" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514955" version="1" comment="bind-utils is &lt;9.9.6P1-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516225" version="1" comment="qemu is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516226" version="1" comment="qemu-block-curl is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516227" version="1" comment="qemu-ipxe is &lt;1.0.0-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516228" version="1" comment="qemu-kvm is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516229" version="1" comment="qemu-seabios is &lt;1.8.1-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516230" version="1" comment="qemu-sgabios is &lt;8-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516231" version="1" comment="qemu-tools is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516232" version="1" comment="qemu-vgabios is &lt;1.8.1-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516233" version="1" comment="qemu-x86 is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333992" version="1" comment="mariadb is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334293" version="1" comment="puppet is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338885" version="1" comment="libevent is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515066" version="1" comment="vorbis-tools is &lt;1.4.0-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515067" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521211" version="1" comment="screen is &lt;4.0.4-23.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514536" version="1" comment="MozillaFirefox is &lt;38.5.0esr-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514537" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515035" version="1" comment="rpcbind is &lt;0.2.1_rc4-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142057" version="1" comment="rpcbind is &lt;0.2.1_rc4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141107" version="1" comment="rpcbind is &lt;0.2.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155620" version="1" comment="rpcbind is &lt;0.2.3-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516000" version="1" comment="libgcrypt20 is &lt;1.6.1-16.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516001" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515692" version="1" comment="qemu is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515693" version="1" comment="qemu-block-curl is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515694" version="1" comment="qemu-ipxe is &lt;1.0.0-48.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515695" version="1" comment="qemu-kvm is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515696" version="1" comment="qemu-seabios is &lt;1.7.4-48.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515697" version="1" comment="qemu-sgabios is &lt;8-48.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515698" version="1" comment="qemu-tools is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515699" version="1" comment="qemu-vgabios is &lt;1.7.4-48.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515700" version="1" comment="qemu-x86 is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516835" version="1" comment="qemu is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516836" version="1" comment="qemu-block-curl is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516837" version="1" comment="qemu-ipxe is &lt;1.0.0-7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516838" version="1" comment="qemu-kvm is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516839" version="1" comment="qemu-seabios is &lt;1.8.1-7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516840" version="1" comment="qemu-sgabios is &lt;8-7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516841" version="1" comment="qemu-tools is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516842" version="1" comment="qemu-vgabios is &lt;1.8.1-7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516843" version="1" comment="qemu-x86 is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519152" version="1" comment="gwenhywfar-lang is &lt;4.9.0beta-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519153" version="1" comment="gwenhywfar-tools is &lt;4.9.0beta-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519154" version="1" comment="libgwengui-gtk2-0 is &lt;4.9.0beta-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519155" version="1" comment="libgwenhywfar60 is &lt;4.9.0beta-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519156" version="1" comment="libgwenhywfar60-plugins is &lt;4.9.0beta-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169499" version="1" comment="gwenhywfar-lang is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169500" version="1" comment="gwenhywfar-tools is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169501" version="1" comment="libgwengui-gtk2-0 is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169502" version="1" comment="libgwenhywfar60 is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169503" version="1" comment="libgwenhywfar60-plugins is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515683" version="1" comment="kernel-default is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515684" version="1" comment="kernel-default-devel is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515685" version="1" comment="kernel-default-extra is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515686" version="1" comment="kernel-devel is &lt;3.12.51-52.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515687" version="1" comment="kernel-macros is &lt;3.12.51-52.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515688" version="1" comment="kernel-source is &lt;3.12.51-52.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515689" version="1" comment="kernel-syms is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515690" version="1" comment="kernel-xen is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515691" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515723" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515724" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515725" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515726" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515727" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515728" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333993" version="1" comment="gtk2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515681" version="1" comment="libtiff5 is &lt;4.0.6-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515682" version="1" comment="libtiff5-32bit is &lt;4.0.6-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515709" version="1" comment="libgif6 is &lt;5.0.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515710" version="1" comment="libgif6-32bit is &lt;5.0.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126709" version="1" comment="libgif6 is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126710" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515845" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515846" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515847" version="1" comment="libdcerpc0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515848" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515849" version="1" comment="libgensec0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515850" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515851" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515852" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515853" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515854" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515855" version="1" comment="libndr-standard0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515856" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515857" version="1" comment="libndr0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515858" version="1" comment="libndr0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515859" version="1" comment="libnetapi0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515860" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515861" version="1" comment="libpdb0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515862" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515863" version="1" comment="libregistry0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515864" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515865" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515866" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515867" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515868" version="1" comment="libsamba-util0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515869" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515870" version="1" comment="libsamdb0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515871" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515872" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515873" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515874" version="1" comment="libsmbclient0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515875" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515876" version="1" comment="libsmbconf0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515877" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515878" version="1" comment="libsmbldap0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515879" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515880" version="1" comment="libtevent-util0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515881" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515882" version="1" comment="libwbclient0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515883" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515884" version="1" comment="samba is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515885" version="1" comment="samba-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515886" version="1" comment="samba-client is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515887" version="1" comment="samba-client-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515888" version="1" comment="samba-doc is &lt;4.1.12-18.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515889" version="1" comment="samba-libs is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515890" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515891" version="1" comment="samba-winbind is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515892" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516870" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516871" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516872" version="1" comment="libdcerpc0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516873" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516874" version="1" comment="libgensec0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516875" version="1" comment="libgensec0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516876" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516877" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516878" version="1" comment="libndr-nbt0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516879" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516880" version="1" comment="libndr-standard0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516881" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516882" version="1" comment="libndr0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516883" version="1" comment="libndr0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516884" version="1" comment="libnetapi0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516885" version="1" comment="libnetapi0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516886" version="1" comment="libregistry0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516887" version="1" comment="libsamba-credentials0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516888" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516889" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516890" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516891" version="1" comment="libsamba-passdb0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516892" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516893" version="1" comment="libsamba-util0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516894" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516895" version="1" comment="libsamdb0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516896" version="1" comment="libsamdb0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516897" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516898" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516899" version="1" comment="libsmbclient0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516900" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516901" version="1" comment="libsmbconf0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516902" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516903" version="1" comment="libsmbldap0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516904" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516905" version="1" comment="libtevent-util0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516906" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516907" version="1" comment="libwbclient0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516908" version="1" comment="libwbclient0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516909" version="1" comment="samba is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516910" version="1" comment="samba-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516911" version="1" comment="samba-client is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516912" version="1" comment="samba-client-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516913" version="1" comment="samba-doc is &lt;4.2.4-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516914" version="1" comment="samba-libs is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516915" version="1" comment="samba-libs-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516916" version="1" comment="samba-winbind is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516917" version="1" comment="samba-winbind-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516123" version="1" comment="libfreebl3 is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516124" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516125" version="1" comment="libsoftokn3 is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516126" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516127" version="1" comment="mozilla-nss is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516128" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516129" version="1" comment="mozilla-nss-certs is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516130" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516131" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516132" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516133" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516619" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.72-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516620" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.72-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515068" version="1" comment="flash-player is &lt;11.2.202.540-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515069" version="1" comment="flash-player-gnome is &lt;11.2.202.540-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515280" version="1" comment="flash-player is &lt;11.2.202.548-111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515281" version="1" comment="flash-player-gnome is &lt;11.2.202.548-111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516088" version="1" comment="ntp is &lt;4.2.8p8-46.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516089" version="1" comment="ntp-doc is &lt;4.2.8p8-46.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517010" version="1" comment="ntp is &lt;4.2.8p7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517011" version="1" comment="ntp-doc is &lt;4.2.8p7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517247" version="1" comment="audiofile is &lt;0.3.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517248" version="1" comment="libaudiofile1 is &lt;0.3.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517249" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150578" version="1" comment="audiofile is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150579" version="1" comment="libaudiofile1 is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150580" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338887" version="1" comment="libbluray is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516035" version="1" comment="wireshark is &lt;1.12.9-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515284" version="1" comment="libpng12-0 is &lt;1.2.50-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515285" version="1" comment="libpng12-0-32bit is &lt;1.2.50-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334102" version="1" comment="libpng16 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517365" version="1" comment="libxslt-tools is &lt;1.1.28-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517366" version="1" comment="libxslt1 is &lt;1.1.28-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517367" version="1" comment="libxslt1-32bit is &lt;1.1.28-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155536" version="1" comment="libxslt-tools is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155537" version="1" comment="libxslt1 is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155538" version="1" comment="libxslt1-32bit is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514538" version="1" comment="bind-libs is &lt;9.9.6P1-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514539" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514540" version="1" comment="bind-utils is &lt;9.9.6P1-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516134" version="1" comment="bind-libs is &lt;9.9.6P1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516135" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516136" version="1" comment="bind-utils is &lt;9.9.6P1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515355" version="1" comment="strongswan is &lt;5.1.3-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515356" version="1" comment="strongswan-doc is &lt;5.1.3-22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515357" version="1" comment="strongswan-ipsec is &lt;5.1.3-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515358" version="1" comment="strongswan-libs0 is &lt;5.1.3-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515289" version="1" comment="xscreensaver is &lt;5.22-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515290" version="1" comment="xscreensaver-data is &lt;5.22-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119273" version="1" comment="xscreensaver is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119274" version="1" comment="xscreensaver-data is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515378" version="1" comment="flash-player is &lt;11.2.202.554-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515379" version="1" comment="flash-player-gnome is &lt;11.2.202.554-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516424" version="1" comment="at is &lt;3.1.14-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516425" version="1" comment="bogofilter is &lt;1.2.4-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516426" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516427" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516428" version="1" comment="libbonobo is &lt;2.32.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516429" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516430" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516431" version="1" comment="libkde4 is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516432" version="1" comment="libkde4-32bit is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516433" version="1" comment="libkdecore4 is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516434" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516435" version="1" comment="libksuseinstall1 is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516436" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516437" version="1" comment="libnetpbm11 is &lt;10.66.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516438" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516439" version="1" comment="netpbm is &lt;10.66.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516440" version="1" comment="openslp is &lt;2.0.0-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516441" version="1" comment="openslp-32bit is &lt;2.0.0-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140736" version="1" comment="libQt5WebKit5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140737" version="1" comment="libQt5WebKit5-imports is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140738" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159059" version="1" comment="libQt5WebKit5 is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159060" version="1" comment="libQt5WebKit5-imports is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159061" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515805" version="1" comment="libpng12-0 is &lt;1.2.50-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515806" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515731" version="1" comment="libpng16-16 is &lt;1.6.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515732" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516863" version="1" comment="libpng15-15 is &lt;1.5.22-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334290" version="1" comment="sudo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516052" version="1" comment="openssh is &lt;6.6p1-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516053" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516054" version="1" comment="openssh-helpers is &lt;6.6p1-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516008" version="1" comment="cups-filters is &lt;1.0.58-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516009" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516010" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516011" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334039" version="1" comment="libraw is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514546" version="1" comment="grub2 is &lt;2.02~beta2-56.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514547" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-56.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514548" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-56.9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514549" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-56.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514550" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-56.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516137" version="1" comment="grub2 is &lt;2.02~beta2-73.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516138" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-73.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516139" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-73.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516140" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-73.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516141" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-73.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140648" version="1" comment="grub2 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140650" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140653" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140654" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140655" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140656" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159010" version="1" comment="grub2 is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159012" version="1" comment="grub2-i386-pc is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159015" version="1" comment="grub2-snapper-plugin is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159016" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159017" version="1" comment="grub2-x86_64-efi is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159018" version="1" comment="grub2-x86_64-xen is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512182" version="1" comment="grub2 is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512183" version="1" comment="grub2-i386-pc is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512184" version="1" comment="grub2-snapper-plugin is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512185" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512186" version="1" comment="grub2-x86_64-efi is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512187" version="1" comment="grub2-x86_64-xen is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514551" version="1" comment="flash-player is &lt;11.2.202.559-117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514552" version="1" comment="flash-player-gnome is &lt;11.2.202.559-117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517231" version="1" comment="libpng12-0 is &lt;1.2.50-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517232" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517250" version="1" comment="libpng15-15 is &lt;1.5.22-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515791" version="1" comment="dhcp is &lt;4.2.6-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515792" version="1" comment="dhcp-client is &lt;4.2.6-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516852" version="1" comment="dhcp is &lt;4.3.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516853" version="1" comment="dhcp-client is &lt;4.3.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515775" version="1" comment="krb5 is &lt;1.12.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515776" version="1" comment="krb5-32bit is &lt;1.12.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515777" version="1" comment="krb5-client is &lt;1.12.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515706" version="1" comment="bind-libs is &lt;9.9.6P1-28.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515707" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515708" version="1" comment="bind-utils is &lt;9.9.6P1-28.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516261" version="1" comment="bind-libs is &lt;9.9.6P1-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516262" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516263" version="1" comment="bind-utils is &lt;9.9.6P1-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516943" version="1" comment="kernel-default is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516944" version="1" comment="kernel-default-devel is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516945" version="1" comment="kernel-default-extra is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516946" version="1" comment="kernel-devel is &lt;3.12.57-60.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516947" version="1" comment="kernel-macros is &lt;3.12.57-60.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516948" version="1" comment="kernel-source is &lt;3.12.57-60.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516949" version="1" comment="kernel-syms is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516950" version="1" comment="kernel-xen is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516951" version="1" comment="kernel-xen-devel is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518467" version="1" comment="kernel-default is &lt;4.4.49-92.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518468" version="1" comment="kernel-default-devel is &lt;4.4.49-92.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518469" version="1" comment="kernel-default-extra is &lt;4.4.49-92.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518470" version="1" comment="kernel-devel is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518471" version="1" comment="kernel-macros is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518472" version="1" comment="kernel-source is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518473" version="1" comment="kernel-syms is &lt;4.4.49-92.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515702" version="1" comment="libxml2-2 is &lt;2.9.1-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515703" version="1" comment="libxml2-2-32bit is &lt;2.9.1-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515704" version="1" comment="libxml2-tools is &lt;2.9.1-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515705" version="1" comment="python-libxml2 is &lt;2.9.1-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516361" version="1" comment="libtiff5 is &lt;4.0.6-26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516362" version="1" comment="libtiff5-32bit is &lt;4.0.6-26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515778" version="1" comment="libhogweed2 is &lt;2.7.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515779" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515780" version="1" comment="libnettle4 is &lt;2.7.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515781" version="1" comment="libnettle4-32bit is &lt;2.7.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123011" version="1" comment="libhogweed2 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123012" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123014" version="1" comment="libnettle4 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123015" version="1" comment="libnettle4-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156348" version="1" comment="libhogweed2 is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156349" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156351" version="1" comment="libnettle4 is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156352" version="1" comment="libnettle4-32bit is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516070" version="1" comment="libxml2-2 is &lt;2.9.1-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516071" version="1" comment="libxml2-2-32bit is &lt;2.9.1-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516072" version="1" comment="libxml2-tools is &lt;2.9.1-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516073" version="1" comment="python-libxml2 is &lt;2.9.1-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515911" version="1" comment="pidgin-otr is &lt;4.0.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516357" version="1" comment="perl is &lt;5.18.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516358" version="1" comment="perl-32bit is &lt;5.18.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516359" version="1" comment="perl-base is &lt;5.18.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516360" version="1" comment="perl-doc is &lt;5.18.2-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516074" version="1" comment="libpoppler-glib8 is &lt;0.24.4-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516075" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516076" version="1" comment="libpoppler44 is &lt;0.24.4-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516077" version="1" comment="poppler-tools is &lt;0.24.4-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518016" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516341" version="1" comment="dosfstools is &lt;3.0.26-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131020" version="1" comment="dosfstools is &lt;3.0.26-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333994" version="1" comment="gdk-pixbuf is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516773" version="1" comment="dnsmasq is &lt;2.71-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516260" version="1" comment="libarchive13 is &lt;3.1.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334081" version="1" comment="libarchive is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334267" version="1" comment="ecryptfs-utils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518823" version="1" comment="ecryptfs-utils is &lt;103-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518824" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517712" version="1" comment="libixion-0_12-0 is &lt;0.12.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517713" version="1" comment="libmwaw-0_3-3 is &lt;0.3.11-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517714" version="1" comment="liborcus-0_12-0 is &lt;0.12.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517715" version="1" comment="libreoffice is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517716" version="1" comment="libreoffice-base is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517717" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517718" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517719" version="1" comment="libreoffice-calc is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517720" version="1" comment="libreoffice-calc-extensions is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517721" version="1" comment="libreoffice-draw is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517722" version="1" comment="libreoffice-filters-optional is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517723" version="1" comment="libreoffice-gnome is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517724" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517725" version="1" comment="libreoffice-icon-theme-tango is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517726" version="1" comment="libreoffice-impress is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517727" version="1" comment="libreoffice-l10n-af is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517728" version="1" comment="libreoffice-l10n-ar is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517729" version="1" comment="libreoffice-l10n-ca is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517730" version="1" comment="libreoffice-l10n-cs is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517731" version="1" comment="libreoffice-l10n-da is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517732" version="1" comment="libreoffice-l10n-de is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517733" version="1" comment="libreoffice-l10n-en is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517734" version="1" comment="libreoffice-l10n-es is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517735" version="1" comment="libreoffice-l10n-fi is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517736" version="1" comment="libreoffice-l10n-fr is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517737" version="1" comment="libreoffice-l10n-gu is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517738" version="1" comment="libreoffice-l10n-hi is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517739" version="1" comment="libreoffice-l10n-hu is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517740" version="1" comment="libreoffice-l10n-it is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517741" version="1" comment="libreoffice-l10n-ja is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517742" version="1" comment="libreoffice-l10n-ko is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517743" version="1" comment="libreoffice-l10n-nb is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517744" version="1" comment="libreoffice-l10n-nl is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517745" version="1" comment="libreoffice-l10n-nn is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517746" version="1" comment="libreoffice-l10n-pl is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517747" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517748" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517749" version="1" comment="libreoffice-l10n-ro is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517750" version="1" comment="libreoffice-l10n-ru is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517751" version="1" comment="libreoffice-l10n-sk is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517752" version="1" comment="libreoffice-l10n-sv is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517753" version="1" comment="libreoffice-l10n-xh is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517754" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517755" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517756" version="1" comment="libreoffice-l10n-zu is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517757" version="1" comment="libreoffice-mailmerge is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517758" version="1" comment="libreoffice-math is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517759" version="1" comment="libreoffice-officebean is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517760" version="1" comment="libreoffice-pyuno is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517761" version="1" comment="libreoffice-writer is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517762" version="1" comment="libreoffice-writer-extensions is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517763" version="1" comment="libreofficekit is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517764" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517765" version="1" comment="libzmf-0_0-0 is &lt;0.0.1-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517766" version="1" comment="myspell-af_NA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517767" version="1" comment="myspell-af_ZA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517768" version="1" comment="myspell-ar is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517769" version="1" comment="myspell-ar_AE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517770" version="1" comment="myspell-ar_BH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517771" version="1" comment="myspell-ar_DZ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517772" version="1" comment="myspell-ar_EG is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517773" version="1" comment="myspell-ar_IQ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517774" version="1" comment="myspell-ar_JO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517775" version="1" comment="myspell-ar_KW is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517776" version="1" comment="myspell-ar_LB is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517777" version="1" comment="myspell-ar_LY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517778" version="1" comment="myspell-ar_MA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517779" version="1" comment="myspell-ar_OM is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517780" version="1" comment="myspell-ar_QA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517781" version="1" comment="myspell-ar_SA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517782" version="1" comment="myspell-ar_SD is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517783" version="1" comment="myspell-ar_SY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517784" version="1" comment="myspell-ar_TN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517785" version="1" comment="myspell-ar_YE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517786" version="1" comment="myspell-be_BY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517787" version="1" comment="myspell-bg_BG is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517788" version="1" comment="myspell-bn_BD is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517789" version="1" comment="myspell-bn_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517790" version="1" comment="myspell-bs is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517791" version="1" comment="myspell-bs_BA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517792" version="1" comment="myspell-ca is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517793" version="1" comment="myspell-ca_AD is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517794" version="1" comment="myspell-ca_ES is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517795" version="1" comment="myspell-ca_ES_valencia is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517796" version="1" comment="myspell-ca_FR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517797" version="1" comment="myspell-ca_IT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517798" version="1" comment="myspell-cs_CZ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517799" version="1" comment="myspell-da_DK is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517800" version="1" comment="myspell-de is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517801" version="1" comment="myspell-de_AT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517802" version="1" comment="myspell-de_CH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517803" version="1" comment="myspell-de_DE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517804" version="1" comment="myspell-dictionaries is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517805" version="1" comment="myspell-el_GR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517806" version="1" comment="myspell-en is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517807" version="1" comment="myspell-en_AU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517808" version="1" comment="myspell-en_BS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517809" version="1" comment="myspell-en_BZ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517810" version="1" comment="myspell-en_CA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517811" version="1" comment="myspell-en_GB is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517812" version="1" comment="myspell-en_GH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517813" version="1" comment="myspell-en_IE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517814" version="1" comment="myspell-en_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517815" version="1" comment="myspell-en_JM is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517816" version="1" comment="myspell-en_MW is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517817" version="1" comment="myspell-en_NA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517818" version="1" comment="myspell-en_NZ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517819" version="1" comment="myspell-en_PH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517820" version="1" comment="myspell-en_TT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517821" version="1" comment="myspell-en_US is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517822" version="1" comment="myspell-en_ZA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517823" version="1" comment="myspell-en_ZW is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517824" version="1" comment="myspell-es is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517825" version="1" comment="myspell-es_AR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517826" version="1" comment="myspell-es_BO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517827" version="1" comment="myspell-es_CL is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517828" version="1" comment="myspell-es_CO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517829" version="1" comment="myspell-es_CR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517830" version="1" comment="myspell-es_CU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517831" version="1" comment="myspell-es_DO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517832" version="1" comment="myspell-es_EC is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517833" version="1" comment="myspell-es_ES is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517834" version="1" comment="myspell-es_GT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517835" version="1" comment="myspell-es_HN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517836" version="1" comment="myspell-es_MX is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517837" version="1" comment="myspell-es_NI is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517838" version="1" comment="myspell-es_PA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517839" version="1" comment="myspell-es_PE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517840" version="1" comment="myspell-es_PR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517841" version="1" comment="myspell-es_PY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517842" version="1" comment="myspell-es_SV is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517843" version="1" comment="myspell-es_UY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517844" version="1" comment="myspell-es_VE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517845" version="1" comment="myspell-et_EE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517846" version="1" comment="myspell-fr_BE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517847" version="1" comment="myspell-fr_CA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517848" version="1" comment="myspell-fr_CH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517849" version="1" comment="myspell-fr_FR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517850" version="1" comment="myspell-fr_LU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517851" version="1" comment="myspell-fr_MC is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517852" version="1" comment="myspell-gu_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517853" version="1" comment="myspell-he_IL is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517854" version="1" comment="myspell-hi_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517855" version="1" comment="myspell-hr_HR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517856" version="1" comment="myspell-hu_HU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517857" version="1" comment="myspell-it_IT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517858" version="1" comment="myspell-lightproof-en is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517859" version="1" comment="myspell-lightproof-hu_HU is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517860" version="1" comment="myspell-lightproof-pt_BR is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517861" version="1" comment="myspell-lightproof-ru_RU is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517862" version="1" comment="myspell-lo_LA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517863" version="1" comment="myspell-lt_LT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517864" version="1" comment="myspell-lv_LV is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517865" version="1" comment="myspell-nb_NO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517866" version="1" comment="myspell-nl_BE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517867" version="1" comment="myspell-nl_NL is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517868" version="1" comment="myspell-nn_NO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517869" version="1" comment="myspell-no is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517870" version="1" comment="myspell-pl_PL is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517871" version="1" comment="myspell-pt_AO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517872" version="1" comment="myspell-pt_BR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517873" version="1" comment="myspell-pt_PT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517874" version="1" comment="myspell-ro is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517875" version="1" comment="myspell-ro_RO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517876" version="1" comment="myspell-ru_RU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517877" version="1" comment="myspell-sk_SK is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517878" version="1" comment="myspell-sl_SI is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517879" version="1" comment="myspell-sr is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517880" version="1" comment="myspell-sr_CS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517881" version="1" comment="myspell-sr_Latn_CS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517882" version="1" comment="myspell-sr_Latn_RS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517883" version="1" comment="myspell-sr_RS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517884" version="1" comment="myspell-sv_FI is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517885" version="1" comment="myspell-sv_SE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517886" version="1" comment="myspell-te is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517887" version="1" comment="myspell-te_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517888" version="1" comment="myspell-th_TH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517889" version="1" comment="myspell-uk_UA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517890" version="1" comment="myspell-vi is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517891" version="1" comment="myspell-vi_VN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517892" version="1" comment="myspell-zu_ZA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519257" version="1" comment="libixion-0_12-0 is &lt;0.12.1-13.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519258" version="1" comment="libmwaw-0_3-3 is &lt;0.3.11-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519259" version="1" comment="liborcus-0_12-0 is &lt;0.12.1-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519260" version="1" comment="libreoffice is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519261" version="1" comment="libreoffice-base is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519262" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519263" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519264" version="1" comment="libreoffice-calc is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519265" version="1" comment="libreoffice-calc-extensions is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519266" version="1" comment="libreoffice-draw is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519267" version="1" comment="libreoffice-filters-optional is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519268" version="1" comment="libreoffice-gnome is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519269" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519270" version="1" comment="libreoffice-icon-theme-tango is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519271" version="1" comment="libreoffice-impress is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519272" version="1" comment="libreoffice-l10n-af is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519273" version="1" comment="libreoffice-l10n-ar is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519274" version="1" comment="libreoffice-l10n-ca is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519275" version="1" comment="libreoffice-l10n-cs is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519276" version="1" comment="libreoffice-l10n-da is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519277" version="1" comment="libreoffice-l10n-de is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519278" version="1" comment="libreoffice-l10n-en is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519279" version="1" comment="libreoffice-l10n-es is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519280" version="1" comment="libreoffice-l10n-fi is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519281" version="1" comment="libreoffice-l10n-fr is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519282" version="1" comment="libreoffice-l10n-gu is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519283" version="1" comment="libreoffice-l10n-hi is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519284" version="1" comment="libreoffice-l10n-hu is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519285" version="1" comment="libreoffice-l10n-it is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519286" version="1" comment="libreoffice-l10n-ja is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519287" version="1" comment="libreoffice-l10n-ko is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519288" version="1" comment="libreoffice-l10n-nb is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519289" version="1" comment="libreoffice-l10n-nl is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519290" version="1" comment="libreoffice-l10n-nn is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519291" version="1" comment="libreoffice-l10n-pl is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519292" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519293" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519294" version="1" comment="libreoffice-l10n-ro is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519295" version="1" comment="libreoffice-l10n-ru is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519296" version="1" comment="libreoffice-l10n-sk is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519297" version="1" comment="libreoffice-l10n-sv is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519298" version="1" comment="libreoffice-l10n-xh is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519299" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519300" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519301" version="1" comment="libreoffice-l10n-zu is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519302" version="1" comment="libreoffice-mailmerge is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519303" version="1" comment="libreoffice-math is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519304" version="1" comment="libreoffice-officebean is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519305" version="1" comment="libreoffice-pyuno is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519306" version="1" comment="libreoffice-writer is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519307" version="1" comment="libreoffice-writer-extensions is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519308" version="1" comment="libreofficekit is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519309" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519310" version="1" comment="libzmf-0_0-0 is &lt;0.0.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519311" version="1" comment="myspell-af_NA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519312" version="1" comment="myspell-af_ZA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519313" version="1" comment="myspell-ar is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519314" version="1" comment="myspell-ar_AE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519315" version="1" comment="myspell-ar_BH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519316" version="1" comment="myspell-ar_DZ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519317" version="1" comment="myspell-ar_EG is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519318" version="1" comment="myspell-ar_IQ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519319" version="1" comment="myspell-ar_JO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519320" version="1" comment="myspell-ar_KW is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519321" version="1" comment="myspell-ar_LB is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519322" version="1" comment="myspell-ar_LY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519323" version="1" comment="myspell-ar_MA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519324" version="1" comment="myspell-ar_OM is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519325" version="1" comment="myspell-ar_QA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519326" version="1" comment="myspell-ar_SA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519327" version="1" comment="myspell-ar_SD is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519328" version="1" comment="myspell-ar_SY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519329" version="1" comment="myspell-ar_TN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519330" version="1" comment="myspell-ar_YE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519331" version="1" comment="myspell-be_BY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519332" version="1" comment="myspell-bg_BG is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519333" version="1" comment="myspell-bn_BD is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519334" version="1" comment="myspell-bn_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519335" version="1" comment="myspell-bs is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519336" version="1" comment="myspell-bs_BA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519337" version="1" comment="myspell-ca is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519338" version="1" comment="myspell-ca_AD is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519339" version="1" comment="myspell-ca_ES is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519340" version="1" comment="myspell-ca_ES_valencia is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519341" version="1" comment="myspell-ca_FR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519342" version="1" comment="myspell-ca_IT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519343" version="1" comment="myspell-cs_CZ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519344" version="1" comment="myspell-da_DK is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519345" version="1" comment="myspell-de is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519346" version="1" comment="myspell-de_AT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519347" version="1" comment="myspell-de_CH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519348" version="1" comment="myspell-de_DE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519349" version="1" comment="myspell-dictionaries is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519350" version="1" comment="myspell-el_GR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519351" version="1" comment="myspell-en is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519352" version="1" comment="myspell-en_AU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519353" version="1" comment="myspell-en_BS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519354" version="1" comment="myspell-en_BZ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519355" version="1" comment="myspell-en_CA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519356" version="1" comment="myspell-en_GB is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519357" version="1" comment="myspell-en_GH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519358" version="1" comment="myspell-en_IE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519359" version="1" comment="myspell-en_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519360" version="1" comment="myspell-en_JM is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519361" version="1" comment="myspell-en_MW is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519362" version="1" comment="myspell-en_NA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519363" version="1" comment="myspell-en_NZ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519364" version="1" comment="myspell-en_PH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519365" version="1" comment="myspell-en_TT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519366" version="1" comment="myspell-en_US is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519367" version="1" comment="myspell-en_ZA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519368" version="1" comment="myspell-en_ZW is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519369" version="1" comment="myspell-es is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519370" version="1" comment="myspell-es_AR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519371" version="1" comment="myspell-es_BO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519372" version="1" comment="myspell-es_CL is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519373" version="1" comment="myspell-es_CO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519374" version="1" comment="myspell-es_CR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519375" version="1" comment="myspell-es_CU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519376" version="1" comment="myspell-es_DO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519377" version="1" comment="myspell-es_EC is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519378" version="1" comment="myspell-es_ES is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519379" version="1" comment="myspell-es_GT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519380" version="1" comment="myspell-es_HN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519381" version="1" comment="myspell-es_MX is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519382" version="1" comment="myspell-es_NI is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519383" version="1" comment="myspell-es_PA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519384" version="1" comment="myspell-es_PE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519385" version="1" comment="myspell-es_PR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519386" version="1" comment="myspell-es_PY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519387" version="1" comment="myspell-es_SV is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519388" version="1" comment="myspell-es_UY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519389" version="1" comment="myspell-es_VE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519390" version="1" comment="myspell-et_EE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519391" version="1" comment="myspell-fr_BE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519392" version="1" comment="myspell-fr_CA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519393" version="1" comment="myspell-fr_CH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519394" version="1" comment="myspell-fr_FR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519395" version="1" comment="myspell-fr_LU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519396" version="1" comment="myspell-fr_MC is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519397" version="1" comment="myspell-gu_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519398" version="1" comment="myspell-he_IL is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519399" version="1" comment="myspell-hi_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519400" version="1" comment="myspell-hr_HR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519401" version="1" comment="myspell-hu_HU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519402" version="1" comment="myspell-it_IT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519403" version="1" comment="myspell-lightproof-en is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519404" version="1" comment="myspell-lightproof-hu_HU is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519405" version="1" comment="myspell-lightproof-pt_BR is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519406" version="1" comment="myspell-lightproof-ru_RU is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519407" version="1" comment="myspell-lo_LA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519408" version="1" comment="myspell-lt_LT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519409" version="1" comment="myspell-lv_LV is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519410" version="1" comment="myspell-nb_NO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519411" version="1" comment="myspell-nl_BE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519412" version="1" comment="myspell-nl_NL is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519413" version="1" comment="myspell-nn_NO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519414" version="1" comment="myspell-no is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519415" version="1" comment="myspell-pl_PL is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519416" version="1" comment="myspell-pt_AO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519417" version="1" comment="myspell-pt_BR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519418" version="1" comment="myspell-pt_PT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519419" version="1" comment="myspell-ro is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519420" version="1" comment="myspell-ro_RO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519421" version="1" comment="myspell-ru_RU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519422" version="1" comment="myspell-sk_SK is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519423" version="1" comment="myspell-sl_SI is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519424" version="1" comment="myspell-sr is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519425" version="1" comment="myspell-sr_CS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519426" version="1" comment="myspell-sr_Latn_CS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519427" version="1" comment="myspell-sr_Latn_RS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519428" version="1" comment="myspell-sr_RS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519429" version="1" comment="myspell-sv_FI is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519430" version="1" comment="myspell-sv_SE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519431" version="1" comment="myspell-te is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519432" version="1" comment="myspell-te_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519433" version="1" comment="myspell-th_TH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519434" version="1" comment="myspell-uk_UA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519435" version="1" comment="myspell-vi is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519436" version="1" comment="myspell-vi_VN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519437" version="1" comment="myspell-zu_ZA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516654" version="1" comment="kernel-default is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516655" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516656" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516657" version="1" comment="kernel-devel is &lt;3.12.67-60.64.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516658" version="1" comment="kernel-macros is &lt;3.12.67-60.64.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516659" version="1" comment="kernel-source is &lt;3.12.67-60.64.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516660" version="1" comment="kernel-syms is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516661" version="1" comment="kernel-xen is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516662" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517096" version="1" comment="kernel-default is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517097" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517098" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517099" version="1" comment="kernel-devel is &lt;3.12.69-60.64.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517100" version="1" comment="kernel-macros is &lt;3.12.69-60.64.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517101" version="1" comment="kernel-source is &lt;3.12.69-60.64.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517102" version="1" comment="kernel-syms is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517103" version="1" comment="kernel-xen is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517104" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334001" version="1" comment="systemd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338981" version="1" comment="unrar is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520076" version="1" comment="libXcursor1 is &lt;1.1.14-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520077" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353593" version="1" comment="libtirpc1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338891" version="1" comment="harfbuzz is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334204" version="1" comment="freetype is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516111" version="1" comment="libmysqlclient18 is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516112" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516113" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516114" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516115" version="1" comment="mariadb is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516116" version="1" comment="mariadb-client is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516117" version="1" comment="mariadb-errormessages is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517025" version="1" comment="libmysqlclient18 is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517026" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517027" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517028" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517029" version="1" comment="mariadb is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517030" version="1" comment="mariadb-client is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517031" version="1" comment="mariadb-errormessages is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520998" version="1" comment="bash is &lt;4.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520999" version="1" comment="bash-doc is &lt;4.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521000" version="1" comment="bash-lang is &lt;4.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521001" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521002" version="1" comment="libreadline6-32bit is &lt;6.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521003" version="1" comment="readline-doc is &lt;6.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515912" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515913" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.99-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516941" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.77-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516942" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.77-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516021" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.101-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516022" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.101-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517008" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.91-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517009" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.91-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516033" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516034" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515711" version="1" comment="kernel-default is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515712" version="1" comment="kernel-default-devel is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515713" version="1" comment="kernel-default-extra is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515714" version="1" comment="kernel-devel is &lt;3.12.51-52.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515715" version="1" comment="kernel-macros is &lt;3.12.51-52.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515716" version="1" comment="kernel-source is &lt;3.12.51-52.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515717" version="1" comment="kernel-syms is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515718" version="1" comment="kernel-xen is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515719" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516307" version="1" comment="kernel-default is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516308" version="1" comment="kernel-default-devel is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516309" version="1" comment="kernel-default-extra is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516310" version="1" comment="kernel-devel is &lt;3.12.51-60.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516311" version="1" comment="kernel-macros is &lt;3.12.51-60.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516312" version="1" comment="kernel-source is &lt;3.12.51-60.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516313" version="1" comment="kernel-syms is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516314" version="1" comment="kernel-xen is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516315" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515998" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515999" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515802" version="1" comment="libssh4 is &lt;0.6.3-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516087" version="1" comment="libspice-server1 is &lt;0.12.4-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515769" version="1" comment="curl is &lt;7.37.0-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515770" version="1" comment="libcurl4 is &lt;7.37.0-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515771" version="1" comment="libcurl4-32bit is &lt;7.37.0-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334083" version="1" comment="postgresql is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516316" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516317" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516599" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516318" version="1" comment="python is &lt;2.7.9-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516319" version="1" comment="python-base is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516320" version="1" comment="python-curses is &lt;2.7.9-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516321" version="1" comment="python-devel is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516322" version="1" comment="python-tk is &lt;2.7.9-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516323" version="1" comment="python-xml is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516600" version="1" comment="python3 is &lt;3.4.5-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516601" version="1" comment="python3-base is &lt;3.4.5-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517500" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517501" version="1" comment="python3 is &lt;3.4.5-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517502" version="1" comment="python3-base is &lt;3.4.5-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517503" version="1" comment="python3-curses is &lt;3.4.5-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516055" version="1" comment="openssh is &lt;6.6p1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516056" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516057" version="1" comment="openssh-helpers is &lt;6.6p1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515814" version="1" comment="libssh2-1 is &lt;1.4.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515815" version="1" comment="libssh2-1-32bit is &lt;1.4.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515487" version="1" comment="boost-license1_54_0 is &lt;1.54.0-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515488" version="1" comment="hunspell is &lt;1.3.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515489" version="1" comment="hunspell-32bit is &lt;1.3.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515490" version="1" comment="hunspell-tools is &lt;1.3.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515491" version="1" comment="libOpenCOLLADA0 is &lt;1_3335ac1-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515492" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515493" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515494" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515495" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515496" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515497" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515498" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515499" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515500" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515501" version="1" comment="libcmis-0_5-5 is &lt;0.5.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515502" version="1" comment="libetonyek-0_1-1 is &lt;0.1.6-6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515503" version="1" comment="libhyphen0 is &lt;2.8.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515504" version="1" comment="libixion-0_11-0 is &lt;0.11.0-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515505" version="1" comment="liborcus-0_11-0 is &lt;0.11.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515506" version="1" comment="libreoffice is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515507" version="1" comment="libreoffice-base is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515508" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515509" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515510" version="1" comment="libreoffice-calc is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515511" version="1" comment="libreoffice-calc-extensions is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515512" version="1" comment="libreoffice-draw is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515513" version="1" comment="libreoffice-filters-optional is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515514" version="1" comment="libreoffice-gnome is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515515" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515516" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515517" version="1" comment="libreoffice-impress is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515518" version="1" comment="libreoffice-l10n-af is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515519" version="1" comment="libreoffice-l10n-ar is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515520" version="1" comment="libreoffice-l10n-ca is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515521" version="1" comment="libreoffice-l10n-cs is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515522" version="1" comment="libreoffice-l10n-da is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515523" version="1" comment="libreoffice-l10n-de is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515524" version="1" comment="libreoffice-l10n-en is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515525" version="1" comment="libreoffice-l10n-es is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515526" version="1" comment="libreoffice-l10n-fi is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515527" version="1" comment="libreoffice-l10n-fr is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515528" version="1" comment="libreoffice-l10n-gu is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515529" version="1" comment="libreoffice-l10n-hi is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515530" version="1" comment="libreoffice-l10n-hu is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515531" version="1" comment="libreoffice-l10n-it is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515532" version="1" comment="libreoffice-l10n-ja is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515533" version="1" comment="libreoffice-l10n-ko is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515534" version="1" comment="libreoffice-l10n-nb is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515535" version="1" comment="libreoffice-l10n-nl is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515536" version="1" comment="libreoffice-l10n-nn is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515537" version="1" comment="libreoffice-l10n-pl is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515538" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515539" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515540" version="1" comment="libreoffice-l10n-ru is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515541" version="1" comment="libreoffice-l10n-sk is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515542" version="1" comment="libreoffice-l10n-sv is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515543" version="1" comment="libreoffice-l10n-xh is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515544" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515545" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515546" version="1" comment="libreoffice-l10n-zu is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515547" version="1" comment="libreoffice-mailmerge is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515548" version="1" comment="libreoffice-math is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515549" version="1" comment="libreoffice-officebean is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515550" version="1" comment="libreoffice-pyuno is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515551" version="1" comment="libreoffice-writer is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515552" version="1" comment="libreoffice-writer-extensions is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515553" version="1" comment="libvisio-0_1-1 is &lt;0.1.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515554" version="1" comment="libwps-0_4-4 is &lt;0.4.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515555" version="1" comment="myspell-af_NA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515556" version="1" comment="myspell-af_ZA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515557" version="1" comment="myspell-ar is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515558" version="1" comment="myspell-ar_AE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515559" version="1" comment="myspell-ar_BH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515560" version="1" comment="myspell-ar_DZ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515561" version="1" comment="myspell-ar_EG is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515562" version="1" comment="myspell-ar_IQ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515563" version="1" comment="myspell-ar_JO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515564" version="1" comment="myspell-ar_KW is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515565" version="1" comment="myspell-ar_LB is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515566" version="1" comment="myspell-ar_LY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515567" version="1" comment="myspell-ar_MA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515568" version="1" comment="myspell-ar_OM is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515569" version="1" comment="myspell-ar_QA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515570" version="1" comment="myspell-ar_SA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515571" version="1" comment="myspell-ar_SD is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515572" version="1" comment="myspell-ar_SY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515573" version="1" comment="myspell-ar_TN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515574" version="1" comment="myspell-ar_YE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515575" version="1" comment="myspell-be_BY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515576" version="1" comment="myspell-bg_BG is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515577" version="1" comment="myspell-bn_BD is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515578" version="1" comment="myspell-bn_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515579" version="1" comment="myspell-bs is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515580" version="1" comment="myspell-bs_BA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515581" version="1" comment="myspell-ca is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515582" version="1" comment="myspell-ca_AD is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515583" version="1" comment="myspell-ca_ES is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515584" version="1" comment="myspell-ca_ES_valencia is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515585" version="1" comment="myspell-ca_FR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515586" version="1" comment="myspell-ca_IT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515587" version="1" comment="myspell-cs_CZ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515588" version="1" comment="myspell-da_DK is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515589" version="1" comment="myspell-de is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515590" version="1" comment="myspell-de_AT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515591" version="1" comment="myspell-de_CH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515592" version="1" comment="myspell-de_DE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515593" version="1" comment="myspell-dictionaries is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515594" version="1" comment="myspell-el_GR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515595" version="1" comment="myspell-en is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515596" version="1" comment="myspell-en_AU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515597" version="1" comment="myspell-en_BS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515598" version="1" comment="myspell-en_BZ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515599" version="1" comment="myspell-en_CA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515600" version="1" comment="myspell-en_GB is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515601" version="1" comment="myspell-en_GH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515602" version="1" comment="myspell-en_IE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515603" version="1" comment="myspell-en_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515604" version="1" comment="myspell-en_JM is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515605" version="1" comment="myspell-en_MW is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515606" version="1" comment="myspell-en_NA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515607" version="1" comment="myspell-en_NZ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515608" version="1" comment="myspell-en_PH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515609" version="1" comment="myspell-en_TT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515610" version="1" comment="myspell-en_US is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515611" version="1" comment="myspell-en_ZA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515612" version="1" comment="myspell-en_ZW is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515613" version="1" comment="myspell-es is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515614" version="1" comment="myspell-es_AR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515615" version="1" comment="myspell-es_BO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515616" version="1" comment="myspell-es_CL is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515617" version="1" comment="myspell-es_CO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515618" version="1" comment="myspell-es_CR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515619" version="1" comment="myspell-es_CU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515620" version="1" comment="myspell-es_DO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515621" version="1" comment="myspell-es_EC is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515622" version="1" comment="myspell-es_ES is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515623" version="1" comment="myspell-es_GT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515624" version="1" comment="myspell-es_HN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515625" version="1" comment="myspell-es_MX is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515626" version="1" comment="myspell-es_NI is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515627" version="1" comment="myspell-es_PA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515628" version="1" comment="myspell-es_PE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515629" version="1" comment="myspell-es_PR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515630" version="1" comment="myspell-es_PY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515631" version="1" comment="myspell-es_SV is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515632" version="1" comment="myspell-es_UY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515633" version="1" comment="myspell-es_VE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515634" version="1" comment="myspell-et_EE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515635" version="1" comment="myspell-fr_BE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515636" version="1" comment="myspell-fr_CA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515637" version="1" comment="myspell-fr_CH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515638" version="1" comment="myspell-fr_FR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515639" version="1" comment="myspell-fr_LU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515640" version="1" comment="myspell-fr_MC is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515641" version="1" comment="myspell-gu_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515642" version="1" comment="myspell-he_IL is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515643" version="1" comment="myspell-hi_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515644" version="1" comment="myspell-hr_HR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515645" version="1" comment="myspell-hu_HU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515646" version="1" comment="myspell-it_IT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515647" version="1" comment="myspell-lightproof-en is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515648" version="1" comment="myspell-lightproof-hu_HU is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515649" version="1" comment="myspell-lightproof-pt_BR is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515650" version="1" comment="myspell-lightproof-ru_RU is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515651" version="1" comment="myspell-lo_LA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515652" version="1" comment="myspell-lt_LT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515653" version="1" comment="myspell-lv_LV is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515654" version="1" comment="myspell-nb_NO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515655" version="1" comment="myspell-nl_BE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515656" version="1" comment="myspell-nl_NL is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515657" version="1" comment="myspell-nn_NO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515658" version="1" comment="myspell-no is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515659" version="1" comment="myspell-pl_PL is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515660" version="1" comment="myspell-pt_AO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515661" version="1" comment="myspell-pt_BR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515662" version="1" comment="myspell-pt_PT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515663" version="1" comment="myspell-ro is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515664" version="1" comment="myspell-ro_RO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515665" version="1" comment="myspell-ru_RU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515666" version="1" comment="myspell-sk_SK is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515667" version="1" comment="myspell-sl_SI is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515668" version="1" comment="myspell-sr is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515669" version="1" comment="myspell-sr_CS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515670" version="1" comment="myspell-sr_Latn_CS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515671" version="1" comment="myspell-sr_Latn_RS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515672" version="1" comment="myspell-sr_RS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515673" version="1" comment="myspell-sv_FI is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515674" version="1" comment="myspell-sv_SE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515675" version="1" comment="myspell-te is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515676" version="1" comment="myspell-te_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515677" version="1" comment="myspell-th_TH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515678" version="1" comment="myspell-vi is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515679" version="1" comment="myspell-vi_VN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515680" version="1" comment="myspell-zu_ZA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515812" version="1" comment="flash-player is &lt;11.2.202.577-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515813" version="1" comment="flash-player-gnome is &lt;11.2.202.577-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515773" version="1" comment="flash-player is &lt;11.2.202.569-120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515774" version="1" comment="flash-player-gnome is &lt;11.2.202.569-120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517156" version="1" comment="openssh is &lt;6.6p1-54.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517157" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517158" version="1" comment="openssh-helpers is &lt;6.6p1-54.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518039" version="1" comment="openssh is &lt;7.2p2-66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518040" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-66.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518041" version="1" comment="openssh-helpers is &lt;7.2p2-66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516758" version="1" comment="xen is &lt;4.5.5_04-22.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516759" version="1" comment="xen-kmp-default is &lt;4.5.5_04_k3.12.67_60.64.24-22.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516760" version="1" comment="xen-libs is &lt;4.5.5_04-22.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516761" version="1" comment="xen-libs-32bit is &lt;4.5.5_04-22.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517545" version="1" comment="xen is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517546" version="1" comment="xen-libs is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517547" version="1" comment="xen-libs-32bit is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517679" version="1" comment="qemu is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517680" version="1" comment="qemu-block-curl is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517681" version="1" comment="qemu-ipxe is &lt;1.0.0-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517682" version="1" comment="qemu-kvm is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517683" version="1" comment="qemu-seabios is &lt;1.9.1-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517684" version="1" comment="qemu-sgabios is &lt;8-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517685" version="1" comment="qemu-tools is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517686" version="1" comment="qemu-vgabios is &lt;1.9.1-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517687" version="1" comment="qemu-x86 is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519764" version="1" comment="libQtWebKit4 is &lt;4.8.7+2.3.4-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519765" version="1" comment="libQtWebKit4-32bit is &lt;4.8.7+2.3.4-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519766" version="1" comment="libqca2 is &lt;2.0.3-17.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519767" version="1" comment="libqca2-32bit is &lt;2.0.3-17.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519768" version="1" comment="libqt4 is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519769" version="1" comment="libqt4-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519770" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519771" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519772" version="1" comment="libqt4-sql is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519773" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519774" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519775" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519776" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519777" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519778" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519779" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519780" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519781" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519782" version="1" comment="libqt4-x11 is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519783" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519784" version="1" comment="qt4-qtscript is &lt;0.2.0-11.2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517127" version="1" comment="ImageMagick is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517128" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517129" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517130" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517131" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516036" version="1" comment="flash-player is &lt;11.2.202.621-130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516037" version="1" comment="flash-player-gnome is &lt;11.2.202.621-130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517181" version="1" comment="libpng16-16 is &lt;1.6.8-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517182" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520448" version="1" comment="libtiff5 is &lt;4.0.9-44.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520449" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518088" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518089" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518090" version="1" comment="pcsc-lite is &lt;1.8.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517337" version="1" comment="qemu is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517338" version="1" comment="qemu-block-curl is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517339" version="1" comment="qemu-ipxe is &lt;1.0.0-32.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517340" version="1" comment="qemu-kvm is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517341" version="1" comment="qemu-seabios is &lt;1.8.1-32.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517342" version="1" comment="qemu-sgabios is &lt;8-32.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517343" version="1" comment="qemu-tools is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517344" version="1" comment="qemu-vgabios is &lt;1.8.1-32.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517345" version="1" comment="qemu-x86 is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517145" version="1" comment="xen is &lt;4.5.5_06-22.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517146" version="1" comment="xen-kmp-default is &lt;4.5.5_06_k3.12.69_60.64.32-22.11.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517147" version="1" comment="xen-libs is &lt;4.5.5_06-22.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517148" version="1" comment="xen-libs-32bit is &lt;4.5.5_06-22.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518477" version="1" comment="qemu is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518478" version="1" comment="qemu-block-curl is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518479" version="1" comment="qemu-ipxe is &lt;1.0.0-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518480" version="1" comment="qemu-kvm is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518481" version="1" comment="qemu-seabios is &lt;1.9.1-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518482" version="1" comment="qemu-sgabios is &lt;8-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518483" version="1" comment="qemu-tools is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518484" version="1" comment="qemu-vgabios is &lt;1.9.1-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518485" version="1" comment="qemu-x86 is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518078" version="1" comment="libsystemd0 is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518079" version="1" comment="libsystemd0-32bit is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518080" version="1" comment="libudev1 is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518081" version="1" comment="libudev1-32bit is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518082" version="1" comment="systemd is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518083" version="1" comment="systemd-32bit is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518084" version="1" comment="systemd-bash-completion is &lt;228-132.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518085" version="1" comment="systemd-sysvinit is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518086" version="1" comment="udev is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518492" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149816" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517105" version="1" comment="libXpm4 is &lt;3.5.11-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517106" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148436" version="1" comment="libXpm4 is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148437" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519150" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.161-43.7.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519151" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.161-43.7.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518297" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.151-27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518298" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.151-27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520287" version="1" comment="lcms2 is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520288" version="1" comment="liblcms2-2 is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520289" version="1" comment="liblcms2-2-32bit is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512209" version="1" comment="lcms2 is &lt;2.7-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512210" version="1" comment="liblcms2-2 is &lt;2.7-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512211" version="1" comment="liblcms2-2-32bit is &lt;2.7-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517107" version="1" comment="gd is &lt;2.1.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517108" version="1" comment="gd-32bit is &lt;2.1.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518991" version="1" comment="libwavpack1 is &lt;4.60.99-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172685" version="1" comment="libwavpack1 is &lt;4.60.99-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518781" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517644" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517645" version="1" comment="MozillaFirefox-branding-SLE is &lt;52-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517646" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517271" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517272" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518579" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-12.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518580" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-12.12 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159019" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159020" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518619" version="1" comment="kernel-default is &lt;4.4.59-92.17.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518620" version="1" comment="kernel-default-devel is &lt;4.4.59-92.17.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518621" version="1" comment="kernel-default-extra is &lt;4.4.59-92.17.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518622" version="1" comment="kernel-devel is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518623" version="1" comment="kernel-macros is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518624" version="1" comment="kernel-source is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518625" version="1" comment="kernel-syms is &lt;4.4.59-92.17.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517112" version="1" comment="tigervnc is &lt;1.4.3-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517113" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518474" version="1" comment="libXvnc1 is &lt;1.6.0-16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518475" version="1" comment="tigervnc is &lt;1.6.0-16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518476" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520342" version="1" comment="libarchive13 is &lt;3.1.2-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522410" version="1" comment="libarchive13 is &lt;3.1.2-26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518881" version="1" comment="ghostscript is &lt;9.15-23.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518882" version="1" comment="ghostscript-x11 is &lt;9.15-23.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517452" version="1" comment="ghostscript is &lt;9.15-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517453" version="1" comment="ghostscript-x11 is &lt;9.15-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518890" version="1" comment="ft2demos is &lt;2.6.3-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518891" version="1" comment="libfreetype6 is &lt;2.6.3-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518892" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521492" version="1" comment="doxygen is &lt;1.8.6-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334023" version="1" comment="jasper is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517251" version="1" comment="libjasper1 is &lt;1.900.14-194.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517252" version="1" comment="libjasper1-32bit is &lt;1.900.14-194.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521561" version="1" comment="elfutils is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521562" version="1" comment="libasm1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521563" version="1" comment="libdw1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521564" version="1" comment="libdw1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521565" version="1" comment="libebl1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521566" version="1" comment="libebl1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521567" version="1" comment="libelf1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521568" version="1" comment="libelf1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521933" version="1" comment="libelf-devel is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517301" version="1" comment="libtiff5 is &lt;4.0.7-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517302" version="1" comment="libtiff5-32bit is &lt;4.0.7-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517334" version="1" comment="libosip2 is &lt;3.5.0-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155050" version="1" comment="libosip2 is &lt;3.5.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518131" version="1" comment="libtiff5 is &lt;4.0.8-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518132" version="1" comment="libtiff5-32bit is &lt;4.0.8-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334004" version="1" comment="openjpeg2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518139" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519797" version="1" comment="openssh is &lt;7.2p2-74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519798" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519799" version="1" comment="openssh-helpers is &lt;7.2p2-74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520881" version="1" comment="patch is &lt;2.7.5-8.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515479" version="1" comment="glibc is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515480" version="1" comment="glibc-32bit is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515481" version="1" comment="glibc-devel is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515482" version="1" comment="glibc-devel-32bit is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515483" version="1" comment="glibc-i18ndata is &lt;2.19-22.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515484" version="1" comment="glibc-locale is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515485" version="1" comment="glibc-locale-32bit is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515486" version="1" comment="nscd is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516243" version="1" comment="glibc is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516244" version="1" comment="glibc-32bit is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516245" version="1" comment="glibc-devel is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516246" version="1" comment="glibc-devel-32bit is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516247" version="1" comment="glibc-i18ndata is &lt;2.19-38.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516248" version="1" comment="glibc-locale is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516249" version="1" comment="glibc-locale-32bit is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516250" version="1" comment="nscd is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522005" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522006" version="1" comment="spamassassin is &lt;3.4.2-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516670" version="1" comment="gvim is &lt;7.4.326-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516671" version="1" comment="vim is &lt;7.4.326-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516672" version="1" comment="vim-data is &lt;7.4.326-7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334044" version="1" comment="postgresql94 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515833" version="1" comment="bind-libs is &lt;9.9.6P1-28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515834" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515835" version="1" comment="bind-utils is &lt;9.9.6P1-28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516867" version="1" comment="bind-libs is &lt;9.9.6P1-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516868" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516869" version="1" comment="bind-utils is &lt;9.9.6P1-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518950" version="1" comment="p7zip is &lt;9.20.1-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515831" version="1" comment="libgraphite2-3 is &lt;1.3.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515832" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124729" version="1" comment="libgraphite2-3 is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124730" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154911" version="1" comment="libgraphite2-3 is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154912" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174098" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174099" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515797" version="1" comment="MozillaFirefox is &lt;38.6.1esr-60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515798" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516095" version="1" comment="libarchive13 is &lt;3.1.2-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140889" version="1" comment="libnghttp2-14 is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512359" version="1" comment="libnghttp2-14-32bit is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519721" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519722" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516097" version="1" comment="kernel-default is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516098" version="1" comment="kernel-default-devel is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516099" version="1" comment="kernel-default-extra is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516100" version="1" comment="kernel-devel is &lt;3.12.55-52.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516101" version="1" comment="kernel-macros is &lt;3.12.55-52.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516102" version="1" comment="kernel-source is &lt;3.12.55-52.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516103" version="1" comment="kernel-syms is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516104" version="1" comment="kernel-xen is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516105" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334306" version="1" comment="apparmor is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517001" version="1" comment="yast2-users is &lt;3.1.41.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141177" version="1" comment="yast2-users is &lt;3.1.57-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159327" version="1" comment="yast2-users is &lt;3.2.11-1.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512639" version="1" comment="yast2-users is &lt;3.2.17-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516065" version="1" comment="supportutils is &lt;3.0-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141131" version="1" comment="supportutils is &lt;3.0-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159308" version="1" comment="supportutils is &lt;3.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512621" version="1" comment="supportutils is &lt;3.0-95.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334008" version="1" comment="libvpx is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518693" version="1" comment="libxml2-2 is &lt;2.9.4-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518694" version="1" comment="libxml2-2-32bit is &lt;2.9.4-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518695" version="1" comment="libxml2-tools is &lt;2.9.4-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518696" version="1" comment="python-libxml2 is &lt;2.9.4-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140865" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140866" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142138" version="1" comment="libwebkit2gtk3-lang is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140867" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140868" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140869" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512337" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512338" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512339" version="1" comment="libwebkit2gtk3-lang is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512340" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512341" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512342" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522086" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515754" version="1" comment="MozillaFirefox is &lt;38.6.0esr-57.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515755" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515756" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-57.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515757" version="1" comment="libfreebl3 is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515758" version="1" comment="libfreebl3-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515759" version="1" comment="libsoftokn3 is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515760" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515761" version="1" comment="mozilla-nss is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515762" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515763" version="1" comment="mozilla-nss-certs is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515764" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515765" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515766" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515767" version="1" comment="mozilla-nss-tools is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515816" version="1" comment="MozillaFirefox is &lt;38.7.0esr-63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515817" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515818" version="1" comment="libfreebl3 is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515819" version="1" comment="libfreebl3-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515820" version="1" comment="libsoftokn3 is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515821" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515822" version="1" comment="mozilla-nspr is &lt;4.12-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515823" version="1" comment="mozilla-nspr-32bit is &lt;4.12-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515824" version="1" comment="mozilla-nss is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515825" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515826" version="1" comment="mozilla-nss-certs is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515827" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515828" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515829" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515830" version="1" comment="mozilla-nss-tools is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517346" version="1" comment="MozillaFirefox is &lt;45.9.0esr-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517347" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517348" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517349" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517350" version="1" comment="libfreebl3 is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517351" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517352" version="1" comment="libsoftokn3 is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517353" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517354" version="1" comment="mozilla-nspr is &lt;4.13.1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517355" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517356" version="1" comment="mozilla-nss is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517357" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517358" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517359" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517360" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517361" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517362" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517072" version="1" comment="cpio is &lt;2.11-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517073" version="1" comment="cpio-lang is &lt;2.11-32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516343" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516344" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516018" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516019" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516020" version="1" comment="openssl is &lt;1.0.1i-27.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517005" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517006" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517007" version="1" comment="openssl is &lt;1.0.1i-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517154" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517155" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517093" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517094" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517095" version="1" comment="openssl is &lt;1.0.1i-54.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561693" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561694" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561695" version="1" comment="libdcerpc0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561696" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561697" version="1" comment="libgensec0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561698" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561699" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561700" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561701" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561702" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561703" version="1" comment="libndr-standard0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561704" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561705" version="1" comment="libndr0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561706" version="1" comment="libndr0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561707" version="1" comment="libnetapi0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561708" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561709" version="1" comment="libregistry0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561710" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561711" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561712" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561713" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561714" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561715" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561716" version="1" comment="libsamba-util0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561717" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561718" version="1" comment="libsamdb0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561719" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561720" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561721" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561722" version="1" comment="libsmbclient0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561723" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561724" version="1" comment="libsmbconf0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561725" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561726" version="1" comment="libsmbldap0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561727" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561728" version="1" comment="libtevent-util0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561729" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561730" version="1" comment="libwbclient0 is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561731" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561732" version="1" comment="samba is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561733" version="1" comment="samba-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561734" version="1" comment="samba-client is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561735" version="1" comment="samba-client-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561736" version="1" comment="samba-doc is &lt;4.2.4-18.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561737" version="1" comment="samba-libs is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561738" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561739" version="1" comment="samba-winbind is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561740" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561741" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561742" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561743" version="1" comment="libdcerpc0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561744" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561745" version="1" comment="libgensec0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561746" version="1" comment="libgensec0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561747" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561748" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561749" version="1" comment="libndr-nbt0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561750" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561751" version="1" comment="libndr-standard0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561752" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561753" version="1" comment="libndr0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561754" version="1" comment="libndr0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561755" version="1" comment="libnetapi0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561756" version="1" comment="libnetapi0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561757" version="1" comment="libregistry0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561758" version="1" comment="libsamba-credentials0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561759" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561760" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561761" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561762" version="1" comment="libsamba-passdb0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561763" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561764" version="1" comment="libsamba-util0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561765" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561766" version="1" comment="libsamdb0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561767" version="1" comment="libsamdb0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561768" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561769" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561770" version="1" comment="libsmbclient0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561771" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561772" version="1" comment="libsmbconf0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561773" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561774" version="1" comment="libsmbldap0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561775" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561776" version="1" comment="libtevent-util0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561777" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561778" version="1" comment="libwbclient0 is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561779" version="1" comment="libwbclient0-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561780" version="1" comment="samba is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561781" version="1" comment="samba-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561782" version="1" comment="samba-client is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561783" version="1" comment="samba-client-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561784" version="1" comment="samba-doc is &lt;4.2.4-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561785" version="1" comment="samba-libs is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561786" version="1" comment="samba-libs-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561787" version="1" comment="samba-winbind is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561788" version="1" comment="samba-winbind-32bit is &lt;4.2.4-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516368" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516369" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516370" version="1" comment="libdcerpc0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516371" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516372" version="1" comment="libgensec0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516373" version="1" comment="libgensec0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516374" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516375" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516376" version="1" comment="libndr-nbt0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516377" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516378" version="1" comment="libndr-standard0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516379" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516380" version="1" comment="libndr0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516381" version="1" comment="libndr0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516382" version="1" comment="libnetapi0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516383" version="1" comment="libnetapi0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516384" version="1" comment="libregistry0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516385" version="1" comment="libsamba-credentials0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516386" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516387" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516388" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516389" version="1" comment="libsamba-passdb0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516390" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516391" version="1" comment="libsamba-util0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516392" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516393" version="1" comment="libsamdb0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516394" version="1" comment="libsamdb0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516395" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516396" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516397" version="1" comment="libsmbclient0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516398" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516399" version="1" comment="libsmbconf0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516400" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516401" version="1" comment="libsmbldap0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516402" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516403" version="1" comment="libtevent-util0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516404" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516405" version="1" comment="libwbclient0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516406" version="1" comment="libwbclient0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516407" version="1" comment="samba is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516408" version="1" comment="samba-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516409" version="1" comment="samba-client is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516410" version="1" comment="samba-client-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516411" version="1" comment="samba-doc is &lt;4.2.4-26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516412" version="1" comment="samba-libs is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516413" version="1" comment="samba-libs-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516414" version="1" comment="samba-winbind is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516415" version="1" comment="samba-winbind-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516774" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516775" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516776" version="1" comment="libdcerpc0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516777" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516778" version="1" comment="libgensec0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516779" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516780" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516781" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516782" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516783" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516784" version="1" comment="libndr-standard0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516785" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516786" version="1" comment="libndr0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516787" version="1" comment="libndr0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516788" version="1" comment="libnetapi0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516789" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516790" version="1" comment="libregistry0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516791" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516792" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516793" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516794" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516795" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516796" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516797" version="1" comment="libsamba-util0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516798" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516799" version="1" comment="libsamdb0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516800" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516801" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516802" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516803" version="1" comment="libsmbclient0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516804" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516805" version="1" comment="libsmbconf0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516806" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516807" version="1" comment="libsmbldap0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516808" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516809" version="1" comment="libtevent-util0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516810" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516811" version="1" comment="libwbclient0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516812" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516813" version="1" comment="samba is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516814" version="1" comment="samba-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516815" version="1" comment="samba-client is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516816" version="1" comment="samba-client-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516817" version="1" comment="samba-doc is &lt;4.2.4-28.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516818" version="1" comment="samba-libs is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516819" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516820" version="1" comment="samba-winbind is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516821" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517593" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517549" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517550" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517551" version="1" comment="libdcerpc0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517552" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517553" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517554" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517555" version="1" comment="libndr-nbt0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517556" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517557" version="1" comment="libndr-standard0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517558" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517559" version="1" comment="libndr0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517560" version="1" comment="libndr0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517561" version="1" comment="libnetapi0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517562" version="1" comment="libnetapi0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517563" version="1" comment="libsamba-credentials0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517564" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517565" version="1" comment="libsamba-errors0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517566" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517567" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517568" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517569" version="1" comment="libsamba-passdb0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517570" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517571" version="1" comment="libsamba-util0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517572" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517573" version="1" comment="libsamdb0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517574" version="1" comment="libsamdb0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517575" version="1" comment="libsmbclient0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517576" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517577" version="1" comment="libsmbconf0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517578" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517579" version="1" comment="libsmbldap0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517580" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517581" version="1" comment="libtevent-util0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517582" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517583" version="1" comment="libwbclient0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517584" version="1" comment="libwbclient0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517585" version="1" comment="samba is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517586" version="1" comment="samba-client is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517587" version="1" comment="samba-client-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517588" version="1" comment="samba-doc is &lt;4.4.2-31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517589" version="1" comment="samba-libs is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517590" version="1" comment="samba-libs-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517591" version="1" comment="samba-winbind is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517592" version="1" comment="samba-winbind-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516462" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516463" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516442" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516443" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516444" version="1" comment="openssl is &lt;1.0.1i-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517110" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.131-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517111" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.131-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517067" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517068" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334362" version="1" comment="hexchat is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334011" version="1" comment="p7zip is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516096" version="1" comment="p7zip is &lt;9.20.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516002" version="1" comment="lhasa is &lt;0.2.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516003" version="1" comment="liblhasa0 is &lt;0.2.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126431" version="1" comment="lhasa is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126432" version="1" comment="liblhasa0 is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334057" version="1" comment="pidgin is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516584" version="1" comment="qemu is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516585" version="1" comment="qemu-block-curl is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516586" version="1" comment="qemu-ipxe is &lt;1.0.0-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516587" version="1" comment="qemu-kvm is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516588" version="1" comment="qemu-seabios is &lt;1.8.1-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516589" version="1" comment="qemu-sgabios is &lt;8-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516590" version="1" comment="qemu-tools is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516591" version="1" comment="qemu-vgabios is &lt;1.8.1-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516592" version="1" comment="qemu-x86 is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517159" version="1" comment="libquicktime0 is &lt;1.2.4-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517936" version="1" comment="libquicktime0 is &lt;1.2.4-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159506" version="1" comment="libquicktime0 is &lt;1.2.4-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516042" version="1" comment="wireshark is &lt;1.12.11-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515452" version="1" comment="dhcp is &lt;4.2.6-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515453" version="1" comment="dhcp-client is &lt;4.2.6-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516256" version="1" comment="dhcp is &lt;4.3.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516257" version="1" comment="dhcp-client is &lt;4.3.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517261" version="1" comment="bind-libs is &lt;9.9.9P1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517262" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517263" version="1" comment="bind-utils is &lt;9.9.9P1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516452" version="1" comment="bind-libs is &lt;9.9.9P1-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516453" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516454" version="1" comment="bind-utils is &lt;9.9.9P1-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516026" version="1" comment="MozillaFirefox is &lt;38.8.0esr-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516027" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515454" version="1" comment="MozillaFirefox is &lt;45.2.0esr-75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515455" version="1" comment="MozillaFirefox-branding-SLE is &lt;45.0-28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515456" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515457" version="1" comment="libfreebl3 is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515458" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515459" version="1" comment="libsoftokn3 is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515460" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515461" version="1" comment="mozilla-nspr is &lt;4.12-15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515462" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515463" version="1" comment="mozilla-nss is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515464" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515465" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515466" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515467" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515468" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515469" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516336" version="1" comment="MozillaFirefox is &lt;45.3.0esr-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516337" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522293" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522294" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515811" version="1" comment="libotr5 is &lt;4.0.0-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124478" version="1" comment="libotr5 is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515945" version="1" comment="krb5 is &lt;1.12.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515946" version="1" comment="krb5-32bit is &lt;1.12.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515947" version="1" comment="krb5-client is &lt;1.12.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516338" version="1" comment="krb5 is &lt;1.12.1-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516339" version="1" comment="krb5-32bit is &lt;1.12.1-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516340" version="1" comment="krb5-client is &lt;1.12.1-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338895" version="1" comment="giflib is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521995" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521996" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521997" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516004" version="1" comment="libcairo-gobject2 is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516005" version="1" comment="libcairo-gobject2-32bit is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516006" version="1" comment="libcairo2 is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516007" version="1" comment="libcairo2-32bit is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517000" version="1" comment="libcairo-script-interpreter2 is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516272" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516273" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516274" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516275" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516349" version="1" comment="libmysqlclient18 is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516350" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516351" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516352" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516353" version="1" comment="mariadb is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516354" version="1" comment="mariadb-client is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516355" version="1" comment="mariadb-errormessages is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516663" version="1" comment="libmysqlclient18 is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516664" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516665" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516666" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516667" version="1" comment="mariadb is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516668" version="1" comment="mariadb-client is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516669" version="1" comment="mariadb-errormessages is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334089" version="1" comment="libjpeg-turbo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516526" version="1" comment="libtiff5 is &lt;4.0.6-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516527" version="1" comment="libtiff5-32bit is &lt;4.0.6-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334077" version="1" comment="tiff is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516014" version="1" comment="libxml2-2 is &lt;2.9.1-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516015" version="1" comment="libxml2-2-32bit is &lt;2.9.1-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516016" version="1" comment="libxml2-tools is &lt;2.9.1-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516017" version="1" comment="python-libxml2 is &lt;2.9.1-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519749" version="1" comment="libtiff5 is &lt;4.0.9-44.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519750" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142139" version="1" comment="libndp0 is &lt;1.6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516028" version="1" comment="ImageMagick is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516029" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516030" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516031" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516032" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516012" version="1" comment="libgif6 is &lt;5.0.5-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516013" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516109" version="1" comment="flash-player is &lt;11.2.202.626-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516110" version="1" comment="flash-player-gnome is &lt;11.2.202.626-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516258" version="1" comment="flash-player is &lt;11.2.202.632-137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516259" version="1" comment="flash-player-gnome is &lt;11.2.202.632-137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516417" version="1" comment="flash-player is &lt;11.2.202.635-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516418" version="1" comment="flash-player-gnome is &lt;11.2.202.635-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516549" version="1" comment="flash-player is &lt;11.2.202.637-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516550" version="1" comment="flash-player-gnome is &lt;11.2.202.637-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516464" version="1" comment="libreoffice is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516465" version="1" comment="libreoffice-base is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516466" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516467" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516468" version="1" comment="libreoffice-calc is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516469" version="1" comment="libreoffice-calc-extensions is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516470" version="1" comment="libreoffice-draw is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516471" version="1" comment="libreoffice-filters-optional is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516472" version="1" comment="libreoffice-gnome is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516473" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516474" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516475" version="1" comment="libreoffice-impress is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516476" version="1" comment="libreoffice-l10n-af is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516477" version="1" comment="libreoffice-l10n-ar is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516478" version="1" comment="libreoffice-l10n-ca is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516479" version="1" comment="libreoffice-l10n-cs is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516480" version="1" comment="libreoffice-l10n-da is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516481" version="1" comment="libreoffice-l10n-de is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516482" version="1" comment="libreoffice-l10n-en is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516483" version="1" comment="libreoffice-l10n-es is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516484" version="1" comment="libreoffice-l10n-fi is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516485" version="1" comment="libreoffice-l10n-fr is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516486" version="1" comment="libreoffice-l10n-gu is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516487" version="1" comment="libreoffice-l10n-hi is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516488" version="1" comment="libreoffice-l10n-hu is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516489" version="1" comment="libreoffice-l10n-it is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516490" version="1" comment="libreoffice-l10n-ja is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516491" version="1" comment="libreoffice-l10n-ko is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516492" version="1" comment="libreoffice-l10n-nb is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516493" version="1" comment="libreoffice-l10n-nl is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516494" version="1" comment="libreoffice-l10n-nn is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516495" version="1" comment="libreoffice-l10n-pl is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516496" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516497" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516498" version="1" comment="libreoffice-l10n-ru is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516499" version="1" comment="libreoffice-l10n-sk is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516500" version="1" comment="libreoffice-l10n-sv is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516501" version="1" comment="libreoffice-l10n-xh is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516502" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516503" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516504" version="1" comment="libreoffice-l10n-zu is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516505" version="1" comment="libreoffice-mailmerge is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516506" version="1" comment="libreoffice-math is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516507" version="1" comment="libreoffice-officebean is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516508" version="1" comment="libreoffice-pyuno is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516509" version="1" comment="libreoffice-writer is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516510" version="1" comment="libreoffice-writer-extensions is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338897" version="1" comment="libksba is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338901" version="1" comment="dracut is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338902" version="1" comment="grub2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516069" version="1" comment="libksba8 is &lt;1.3.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516593" version="1" comment="libxml2-2 is &lt;2.9.1-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516594" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516595" version="1" comment="libxml2-tools is &lt;2.9.1-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516596" version="1" comment="python-libxml2 is &lt;2.9.1-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518369" version="1" comment="libxml2-2 is &lt;2.9.4-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518370" version="1" comment="libxml2-2-32bit is &lt;2.9.4-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518371" version="1" comment="libxml2-tools is &lt;2.9.4-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518372" version="1" comment="python-libxml2 is &lt;2.9.4-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518791" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518792" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518793" version="1" comment="libwebkit2gtk3-lang is &lt;2.18.5-2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518794" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518795" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518796" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516602" version="1" comment="openslp is &lt;2.0.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516603" version="1" comment="openslp-32bit is &lt;2.0.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519172" version="1" comment="openslp is &lt;2.0.0-18.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519173" version="1" comment="openslp-32bit is &lt;2.0.0-18.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517023" version="1" comment="ntp is &lt;4.2.8p8-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517024" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334154" version="1" comment="gcc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334156" version="1" comment="gcc48 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338910" version="1" comment="gcc5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516267" version="1" comment="gimp is &lt;2.8.10-7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516268" version="1" comment="gimp-lang is &lt;2.8.10-7.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516269" version="1" comment="gimp-plugins-python is &lt;2.8.10-7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516270" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516271" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515470" version="1" comment="kernel-default is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515471" version="1" comment="kernel-default-devel is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515472" version="1" comment="kernel-default-extra is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515473" version="1" comment="kernel-devel is &lt;3.12.60-52.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515474" version="1" comment="kernel-macros is &lt;3.12.60-52.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515475" version="1" comment="kernel-source is &lt;3.12.60-52.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515476" version="1" comment="kernel-syms is &lt;3.12.60-52.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515477" version="1" comment="kernel-xen is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515478" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516276" version="1" comment="libvirt is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516277" version="1" comment="libvirt-client is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516278" version="1" comment="libvirt-client-32bit is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516279" version="1" comment="libvirt-daemon is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516280" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516281" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516282" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516283" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516284" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516285" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516286" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516287" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516288" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516289" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516290" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516291" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516292" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516293" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516294" version="1" comment="libvirt-doc is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518299" version="1" comment="ceph-common is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518300" version="1" comment="libcephfs1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518301" version="1" comment="librados2 is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518302" version="1" comment="libradosstriper1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518303" version="1" comment="librbd1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518304" version="1" comment="python-cephfs is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518305" version="1" comment="python-rados is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518306" version="1" comment="python-rbd is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516295" version="1" comment="ImageMagick is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516296" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516297" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516298" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516299" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516621" version="1" comment="libblkid1 is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516622" version="1" comment="libblkid1-32bit is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516623" version="1" comment="libmount1 is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516624" version="1" comment="libmount1-32bit is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516625" version="1" comment="libsmartcols1 is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516626" version="1" comment="libuuid-devel is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516627" version="1" comment="libuuid1 is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516628" version="1" comment="libuuid1-32bit is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516629" version="1" comment="python-libmount is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516630" version="1" comment="util-linux is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516631" version="1" comment="util-linux-lang is &lt;2.25-37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516632" version="1" comment="util-linux-systemd is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516633" version="1" comment="uuidd is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517514" version="1" comment="libblkid1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517515" version="1" comment="libblkid1-32bit is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517516" version="1" comment="libfdisk1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517517" version="1" comment="libmount1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517518" version="1" comment="libmount1-32bit is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517519" version="1" comment="libsmartcols1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517520" version="1" comment="libuuid-devel is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517521" version="1" comment="libuuid1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517522" version="1" comment="libuuid1-32bit is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517523" version="1" comment="python-libmount is &lt;2.28-42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517524" version="1" comment="util-linux is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517525" version="1" comment="util-linux-lang is &lt;2.28-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517526" version="1" comment="util-linux-systemd is &lt;2.28-42.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517527" version="1" comment="uuidd is &lt;2.28-42.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522397" version="1" comment="libtiff5 is &lt;4.0.9-44.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522398" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516119" version="1" comment="libimobiledevice-tools is &lt;1.1.5-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516120" version="1" comment="libimobiledevice4 is &lt;1.1.5-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516121" version="1" comment="libusbmuxd2 is &lt;1.0.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516122" version="1" comment="usbmuxd is &lt;1.0.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140975" version="1" comment="libusbmuxd4 is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516366" version="1" comment="gd is &lt;2.1.0-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516367" version="1" comment="gd-32bit is &lt;2.1.0-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516090" version="1" comment="ImageMagick is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516091" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516092" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516093" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516094" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518877" version="1" comment="libxml2-2 is &lt;2.9.4-46.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518878" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518879" version="1" comment="libxml2-tools is &lt;2.9.4-46.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518880" version="1" comment="python-libxml2 is &lt;2.9.4-46.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516824" version="1" comment="libcares2 is &lt;1.9.1-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516825" version="1" comment="libcares2-32bit is &lt;1.9.1-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146003" version="1" comment="libcares2 is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146004" version="1" comment="libcares2-32bit is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512258" version="1" comment="libcares2 is &lt;1.9.1-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512259" version="1" comment="libcares2-32bit is &lt;1.9.1-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516575" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516576" version="1" comment="kernel-default-devel is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516577" version="1" comment="kernel-default-extra is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516578" version="1" comment="kernel-devel is &lt;3.12.62-60.64.8.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516579" version="1" comment="kernel-macros is &lt;3.12.62-60.64.8.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516580" version="1" comment="kernel-source is &lt;3.12.62-60.64.8.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516581" version="1" comment="kernel-syms is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516582" version="1" comment="kernel-xen is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516583" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516459" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516460" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516700" version="1" comment="MozillaFirefox is &lt;45.5.0esr-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516701" version="1" comment="MozillaFirefox-translations is &lt;45.5.0esr-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516702" version="1" comment="libfreebl3 is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516703" version="1" comment="libfreebl3-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516704" version="1" comment="libsoftokn3 is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516705" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516706" version="1" comment="mozilla-nss is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516707" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516708" version="1" comment="mozilla-nss-certs is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516709" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516710" version="1" comment="mozilla-nss-sysinit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516711" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516712" version="1" comment="mozilla-nss-tools is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520078" version="1" comment="libtiff5 is &lt;4.0.9-44.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520079" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516461" version="1" comment="wireshark is &lt;1.12.13-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516347" version="1" comment="fontconfig is &lt;2.11.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516348" version="1" comment="fontconfig-32bit is &lt;2.11.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140574" version="1" comment="fontconfig is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140575" version="1" comment="fontconfig-32bit is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516531" version="1" comment="libX11-6 is &lt;1.6.2-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516532" version="1" comment="libX11-6-32bit is &lt;1.6.2-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516533" version="1" comment="libX11-data is &lt;1.6.2-6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516534" version="1" comment="libX11-xcb1 is &lt;1.6.2-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516535" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516536" version="1" comment="libXfixes3 is &lt;5.0.1-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516537" version="1" comment="libXfixes3-32bit is &lt;5.0.1-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516538" version="1" comment="libXi6 is &lt;1.7.4-12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516539" version="1" comment="libXi6-32bit is &lt;1.7.4-12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516540" version="1" comment="libXrandr2 is &lt;1.4.2-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516541" version="1" comment="libXrandr2-32bit is &lt;1.4.2-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516542" version="1" comment="libXrender1 is &lt;0.9.8-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516543" version="1" comment="libXrender1-32bit is &lt;0.9.8-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516544" version="1" comment="libXtst6 is &lt;1.2.2-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516545" version="1" comment="libXtst6-32bit is &lt;1.2.2-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516546" version="1" comment="libXv1 is &lt;1.0.10-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516547" version="1" comment="libXv1-32bit is &lt;1.0.10-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516548" version="1" comment="libXvMC1 is &lt;1.0.8-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517484" version="1" comment="libX11-6 is &lt;1.6.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517485" version="1" comment="libX11-6-32bit is &lt;1.6.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517486" version="1" comment="libX11-data is &lt;1.6.2-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517487" version="1" comment="libX11-xcb1 is &lt;1.6.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517488" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517489" version="1" comment="libXfixes3 is &lt;5.0.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517490" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517491" version="1" comment="libXi6 is &lt;1.7.4-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517492" version="1" comment="libXi6-32bit is &lt;1.7.4-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517493" version="1" comment="libXrender1 is &lt;0.9.8-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517494" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517495" version="1" comment="libXtst6 is &lt;1.2.2-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517496" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517497" version="1" comment="libXv1 is &lt;1.0.10-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517498" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517499" version="1" comment="libXvMC1 is &lt;1.0.8-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516419" version="1" comment="curl is &lt;7.37.0-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516420" version="1" comment="libcurl4 is &lt;7.37.0-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516421" version="1" comment="libcurl4-32bit is &lt;7.37.0-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516455" version="1" comment="libecpg6 is &lt;9.4.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516456" version="1" comment="libpq5 is &lt;9.4.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516457" version="1" comment="libpq5-32bit is &lt;9.4.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516458" version="1" comment="postgresql94 is &lt;9.4.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516678" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516679" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516648" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516649" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334352" version="1" comment="yast2-storage is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516345" version="1" comment="libstorage-ruby is &lt;2.25.35.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516346" version="1" comment="libstorage6 is &lt;2.25.35.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516557" version="1" comment="kdump is &lt;0.8.15-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140694" version="1" comment="kdump is &lt;0.8.15-28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159034" version="1" comment="kdump is &lt;0.8.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512196" version="1" comment="kdump is &lt;0.8.16-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516680" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334353" version="1" comment="libical is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517937" version="1" comment="libical1 is &lt;1.0.1-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517938" version="1" comment="libical1-32bit is &lt;1.0.1-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159508" version="1" comment="libical1 is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159509" version="1" comment="libical1-32bit is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334069" version="1" comment="binutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516264" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516265" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516266" version="1" comment="sqlite3 is &lt;3.8.10.2-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130774" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130775" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130776" version="1" comment="sqlite3 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159203" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159204" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159205" version="1" comment="sqlite3 is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516363" version="1" comment="openssh is &lt;6.6p1-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516364" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516365" version="1" comment="openssh-helpers is &lt;6.6p1-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519796" version="1" comment="shadow is &lt;4.2.1-27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512619" version="1" comment="shadow is &lt;4.2.1-27.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516511" version="1" comment="xen is &lt;4.5.3_10-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516512" version="1" comment="xen-kmp-default is &lt;4.5.3_10_k3.12.62_60.62-20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516513" version="1" comment="xen-libs is &lt;4.5.3_10-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516514" version="1" comment="xen-libs-32bit is &lt;4.5.3_10-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334242" version="1" comment="icu is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516422" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516423" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516333" version="1" comment="cracklib is &lt;2.9.0-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516334" version="1" comment="libcrack2 is &lt;2.9.0-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516335" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130930" version="1" comment="cracklib is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131013" version="1" comment="libcrack2 is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131014" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516650" version="1" comment="tar is &lt;1.27.1-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516651" version="1" comment="tar-lang is &lt;1.27.1-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518774" version="1" comment="libexif12 is &lt;0.6.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518775" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518753" version="1" comment="openvpn is &lt;2.3.8-16.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517454" version="1" comment="libwireshark8 is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517455" version="1" comment="libwiretap6 is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517456" version="1" comment="libwscodecs1 is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517457" version="1" comment="libwsutil7 is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517458" version="1" comment="wireshark is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517459" version="1" comment="wireshark-gtk is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131107" version="1" comment="at is &lt;3.1.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131109" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131110" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131111" version="1" comment="libbonobo is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131112" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131113" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131114" version="1" comment="libkde4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131115" version="1" comment="libkde4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131116" version="1" comment="libkdecore4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131117" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131118" version="1" comment="libksuseinstall1 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131119" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131120" version="1" comment="libnetpbm11 is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131121" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131122" version="1" comment="netpbm is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155614" version="1" comment="libkde4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155615" version="1" comment="libkde4-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155616" version="1" comment="libkdecore4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155617" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155618" version="1" comment="libksuseinstall1 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155619" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139268" version="1" comment="libnetpbm11 is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156953" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139269" version="1" comment="netpbm is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512029" version="1" comment="at is &lt;3.1.14-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512030" version="1" comment="libQtWebKit4 is &lt;4.8.7+2.3.4-4.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512031" version="1" comment="libQtWebKit4-32bit is &lt;4.8.7+2.3.4-4.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518701" version="1" comment="libhogweed2 is &lt;2.7.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518702" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518703" version="1" comment="libnettle4 is &lt;2.7.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518704" version="1" comment="libnettle4-32bit is &lt;2.7.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516445" version="1" comment="libmysqlclient18 is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516446" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516447" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516448" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516449" version="1" comment="mariadb is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516450" version="1" comment="mariadb-client is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516451" version="1" comment="mariadb-errormessages is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517078" version="1" comment="libmysqlclient18 is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517079" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517080" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517081" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517082" version="1" comment="mariadb is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517083" version="1" comment="mariadb-client is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517084" version="1" comment="mariadb-errormessages is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516673" version="1" comment="ImageMagick is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516674" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516675" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516676" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516677" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516640" version="1" comment="eog is &lt;3.10.2-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516641" version="1" comment="eog-lang is &lt;3.10.2-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516606" version="1" comment="gd is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516607" version="1" comment="gd-32bit is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517513" version="1" comment="sudo is &lt;1.8.10p3-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518446" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518447" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518448" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518449" version="1" comment="openssl is &lt;1.0.2j-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516772" version="1" comment="wget is &lt;1.14-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516686" version="1" comment="qemu is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516687" version="1" comment="qemu-block-curl is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516688" version="1" comment="qemu-ipxe is &lt;1.0.0-24.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516689" version="1" comment="qemu-kvm is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516690" version="1" comment="qemu-seabios is &lt;1.8.1-24.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516691" version="1" comment="qemu-sgabios is &lt;8-24.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516692" version="1" comment="qemu-tools is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516693" version="1" comment="qemu-vgabios is &lt;1.8.1-24.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516694" version="1" comment="qemu-x86 is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517504" version="1" comment="qemu is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517505" version="1" comment="qemu-block-curl is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517506" version="1" comment="qemu-ipxe is &lt;1.0.0-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517507" version="1" comment="qemu-kvm is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517508" version="1" comment="qemu-seabios is &lt;1.9.1-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517509" version="1" comment="qemu-sgabios is &lt;8-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517510" version="1" comment="qemu-tools is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517511" version="1" comment="qemu-vgabios is &lt;1.9.1-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517512" version="1" comment="qemu-x86 is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338935" version="1" comment="file-roller is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516616" version="1" comment="curl is &lt;7.37.0-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516617" version="1" comment="libcurl4 is &lt;7.37.0-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516618" version="1" comment="libcurl4-32bit is &lt;7.37.0-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517069" version="1" comment="gnutls is &lt;3.2.15-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517070" version="1" comment="libgnutls28 is &lt;3.2.15-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517071" version="1" comment="libgnutls28-32bit is &lt;3.2.15-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517548" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145907" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518289" version="1" comment="ImageMagick is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518290" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518291" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518292" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518293" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516728" version="1" comment="xen is &lt;4.5.5_02-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516729" version="1" comment="xen-kmp-default is &lt;4.5.5_02_k3.12.67_60.64.18-22.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516730" version="1" comment="xen-libs is &lt;4.5.5_02-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516731" version="1" comment="xen-libs-32bit is &lt;4.5.5_02-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517535" version="1" comment="xen is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517536" version="1" comment="xen-libs is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517537" version="1" comment="xen-libs-32bit is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516515" version="1" comment="libgudev-1_0-0 is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516516" version="1" comment="libgudev-1_0-0-32bit is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516517" version="1" comment="libudev1 is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516518" version="1" comment="libudev1-32bit is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516519" version="1" comment="systemd is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516520" version="1" comment="systemd-32bit is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516521" version="1" comment="systemd-bash-completion is &lt;210-114.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516522" version="1" comment="systemd-sysvinit is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516523" version="1" comment="udev is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519723" version="1" comment="bluez is &lt;5.13-5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519724" version="1" comment="bluez-cups is &lt;5.13-5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519725" version="1" comment="libbluetooth3 is &lt;5.13-5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512050" version="1" comment="bluez is &lt;5.13-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512051" version="1" comment="bluez-cups is &lt;5.13-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512052" version="1" comment="libbluetooth3 is &lt;5.13-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516604" version="1" comment="flash-player is &lt;11.2.202.643-146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516605" version="1" comment="flash-player-gnome is &lt;11.2.202.643-146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516636" version="1" comment="flash-player is &lt;11.2.202.644-149.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516637" version="1" comment="flash-player-gnome is &lt;11.2.202.644-149.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516733" version="1" comment="flash-player is &lt;24.0.0.186-152.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516734" version="1" comment="flash-player-gnome is &lt;24.0.0.186-152.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516695" version="1" comment="libX11-6 is &lt;1.6.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516696" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516697" version="1" comment="libX11-data is &lt;1.6.2-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516698" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516699" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516722" version="1" comment="libXi6 is &lt;1.7.4-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516723" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516732" version="1" comment="libass5 is &lt;0.10.2-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142721" version="1" comment="libass5 is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516524" version="1" comment="ghostscript is &lt;9.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516525" version="1" comment="ghostscript-x11 is &lt;9.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516597" version="1" comment="ghostscript is &lt;9.15-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516598" version="1" comment="ghostscript-x11 is &lt;9.15-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517074" version="1" comment="guile is &lt;2.0.9-8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517075" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517076" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148134" version="1" comment="guile is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148135" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148136" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334019" version="1" comment="guile is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520405" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520406" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516713" version="1" comment="kernel-default is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516714" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516715" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516716" version="1" comment="kernel-devel is &lt;3.12.67-60.64.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516717" version="1" comment="kernel-macros is &lt;3.12.67-60.64.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516718" version="1" comment="kernel-source is &lt;3.12.67-60.64.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516719" version="1" comment="kernel-syms is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516720" version="1" comment="kernel-xen is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516721" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517528" version="1" comment="kernel-default is &lt;4.4.21-84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517529" version="1" comment="kernel-default-devel is &lt;4.4.21-84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517530" version="1" comment="kernel-default-extra is &lt;4.4.21-84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517531" version="1" comment="kernel-devel is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517532" version="1" comment="kernel-macros is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517533" version="1" comment="kernel-source is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517534" version="1" comment="kernel-syms is &lt;4.4.21-84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517160" version="1" comment="dracut is &lt;037-91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518550" version="1" comment="dracut is &lt;044-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517125" version="1" comment="libjasper1 is &lt;1.900.14-184.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517126" version="1" comment="libjasper1-32bit is &lt;1.900.14-184.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516613" version="1" comment="bind-libs is &lt;9.9.9P1-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516614" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516615" version="1" comment="bind-utils is &lt;9.9.9P1-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561941" version="1" comment="python-setuptools is &lt;40.6.2-4.12.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561942" version="1" comment="python3-setuptools is &lt;40.6.2-4.12.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517303" version="1" comment="ntp is &lt;4.2.8p10-60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517304" version="1" comment="ntp-doc is &lt;4.2.8p10-60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518043" version="1" comment="expat is &lt;2.1.0-21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518044" version="1" comment="libexpat1 is &lt;2.1.0-21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518045" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516724" version="1" comment="MozillaFirefox is &lt;45.5.1esr-93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516725" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517639" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517640" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517641" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517642" version="1" comment="libcairo2 is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517643" version="1" comment="libcairo2-32bit is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157339" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157340" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157341" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157342" version="1" comment="libcairo2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157343" version="1" comment="libcairo2-32bit is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175342" version="1" comment="libcairo-gobject2 is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175343" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175344" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175345" version="1" comment="libcairo2 is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175346" version="1" comment="libcairo2-32bit is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518610" version="1" comment="qemu is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518611" version="1" comment="qemu-block-curl is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518612" version="1" comment="qemu-ipxe is &lt;1.0.0-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518613" version="1" comment="qemu-kvm is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518614" version="1" comment="qemu-seabios is &lt;1.9.1-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518615" version="1" comment="qemu-sgabios is &lt;8-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518616" version="1" comment="qemu-tools is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518617" version="1" comment="qemu-vgabios is &lt;1.9.1-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518618" version="1" comment="qemu-x86 is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517244" version="1" comment="bind-libs is &lt;9.9.9P1-53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517245" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517246" version="1" comment="bind-utils is &lt;9.9.9P1-53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517934" version="1" comment="libjasper1 is &lt;1.900.14-195.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517935" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520259" version="1" comment="libjasper1 is &lt;1.900.14-195.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520260" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521990" version="1" comment="libxml2-2 is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521991" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521992" version="1" comment="libxml2-tools is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521993" version="1" comment="python-libxml2 is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522238" version="1" comment="libjasper1 is &lt;1.900.14-195.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522239" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518626" version="1" comment="bash is &lt;4.3-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518627" version="1" comment="bash-doc is &lt;4.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518628" version="1" comment="bash-lang is &lt;4.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518629" version="1" comment="libreadline6 is &lt;6.3-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518630" version="1" comment="libreadline6-32bit is &lt;6.3-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518631" version="1" comment="readline-doc is &lt;6.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516727" version="1" comment="libgc1 is &lt;7.2d-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516726" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517041" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517042" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516826" version="1" comment="gstreamer-plugins-bad is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516827" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.2.4-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517043" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517044" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516828" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517045" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517046" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517047" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516829" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516830" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516831" version="1" comment="libgstmpegts-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517048" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517049" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516832" version="1" comment="libgstphotography-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517050" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517051" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517052" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517053" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517983" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517984" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517594" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517595" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517596" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517597" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517598" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517599" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517985" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517986" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517600" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517987" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517988" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517989" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517601" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517602" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517603" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517990" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517991" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517604" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517992" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517993" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517605" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517994" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517995" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150831" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150832" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150833" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150834" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150835" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150836" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150837" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150838" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150839" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150840" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150841" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150842" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516747" version="1" comment="kernel-default is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516748" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516749" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516750" version="1" comment="kernel-devel is &lt;3.12.67-60.64.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516751" version="1" comment="kernel-macros is &lt;3.12.67-60.64.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516752" version="1" comment="kernel-source is &lt;3.12.67-60.64.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516753" version="1" comment="kernel-syms is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516754" version="1" comment="kernel-xen is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516755" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517538" version="1" comment="kernel-default is &lt;4.4.21-90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517539" version="1" comment="kernel-default-devel is &lt;4.4.21-90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517540" version="1" comment="kernel-default-extra is &lt;4.4.21-90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517541" version="1" comment="kernel-devel is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517542" version="1" comment="kernel-macros is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517543" version="1" comment="kernel-source is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517544" version="1" comment="kernel-syms is &lt;4.4.21-90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517077" version="1" comment="libspice-server1 is &lt;0.12.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518386" version="1" comment="libspice-server1 is &lt;0.12.7-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517298" version="1" comment="curl is &lt;7.37.0-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517299" version="1" comment="libcurl4 is &lt;7.37.0-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517300" version="1" comment="libcurl4-32bit is &lt;7.37.0-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334009" version="1" comment="libxml2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517318" version="1" comment="xen is &lt;4.5.5_10-22.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517319" version="1" comment="xen-kmp-default is &lt;4.5.5_10_k3.12.69_60.64.35-22.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517320" version="1" comment="xen-libs is &lt;4.5.5_10-22.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517321" version="1" comment="xen-libs-32bit is &lt;4.5.5_10-22.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518050" version="1" comment="xen is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518051" version="1" comment="xen-libs is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518052" version="1" comment="xen-libs-32bit is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517032" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-13.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517033" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-13.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516822" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516823" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517655" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517656" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517606" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517607" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147371" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147372" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521197" version="1" comment="bluez is &lt;5.13-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521198" version="1" comment="bluez-cups is &lt;5.13-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521199" version="1" comment="libbluetooth3 is &lt;5.13-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522346" version="1" comment="bluez is &lt;5.13-5.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522347" version="1" comment="bluez-cups is &lt;5.13-5.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522348" version="1" comment="libbluetooth3 is &lt;5.13-5.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334185" version="1" comment="bluez is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520445" version="1" comment="bluez is &lt;5.13-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520446" version="1" comment="bluez-cups is &lt;5.13-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520447" version="1" comment="libbluetooth3 is &lt;5.13-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517054" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517055" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517056" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517057" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517058" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517059" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517060" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517061" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517062" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517063" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517064" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517065" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517066" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518219" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518220" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518221" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518222" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518223" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518224" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518225" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518226" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518227" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518228" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518229" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518230" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518231" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517034" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517035" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517036" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517461" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517462" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517463" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517037" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517038" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517464" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517465" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517466" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517467" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517468" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517469" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517039" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517040" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517470" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517471" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517472" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517473" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517474" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517475" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517476" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517477" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517478" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517479" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517480" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517481" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517482" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517483" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517944" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517945" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517946" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517610" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517611" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-9.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517612" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517947" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517948" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517613" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517614" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517615" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517616" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517617" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517618" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517949" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517950" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517619" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517620" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517621" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517622" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517623" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517624" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517625" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517626" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517627" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517628" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517629" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517630" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517631" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517632" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154327" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154328" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154329" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154408" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154409" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154410" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154330" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154331" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154411" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154412" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154413" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154414" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154415" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154416" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154332" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154333" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154417" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154418" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154419" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154420" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154421" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154422" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154423" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154424" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154425" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154426" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154427" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154428" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154429" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154430" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517149" version="1" comment="libz1 is &lt;1.2.8-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517150" version="1" comment="libz1-32bit is &lt;1.2.8-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518383" version="1" comment="libz1 is &lt;1.2.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518384" version="1" comment="libz1-32bit is &lt;1.2.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518385" version="1" comment="zlib-devel is &lt;1.2.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146180" version="1" comment="libz1 is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146181" version="1" comment="libz1-32bit is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512005" version="1" comment="zlib-devel is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521810" version="1" comment="libmysqlclient18 is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521811" version="1" comment="libmysqlclient18-32bit is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521812" version="1" comment="libmysqlclient_r18 is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521813" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512567" version="1" comment="libz1 is &lt;1.2.11-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512568" version="1" comment="libz1-32bit is &lt;1.2.11-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521826" version="1" comment="mariadb is &lt;10.2.21-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521814" version="1" comment="mariadb-100-errormessages is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521827" version="1" comment="mariadb-client is &lt;10.2.21-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521828" version="1" comment="mariadb-errormessages is &lt;10.2.21-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512569" version="1" comment="zlib-devel is &lt;1.2.11-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516764" version="1" comment="MozillaFirefox is &lt;45.6.0esr-96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516765" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518464" version="1" comment="xen is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518465" version="1" comment="xen-libs is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518466" version="1" comment="xen-libs-32bit is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516762" version="1" comment="gd is &lt;2.1.0-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516763" version="1" comment="gd-32bit is &lt;2.1.0-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516766" version="1" comment="libgme0 is &lt;0.6.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145377" version="1" comment="libgme0 is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338941" version="1" comment="libwebp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520310" version="1" comment="libntfs-3g84 is &lt;2013.1.13-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520311" version="1" comment="ntfs-3g is &lt;2013.1.13-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520312" version="1" comment="ntfsprogs is &lt;2013.1.13-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334024" version="1" comment="libgcrypt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517090" version="1" comment="libopus0 is &lt;1.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148261" version="1" comment="libopus0 is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517647" version="1" comment="libxml2-2 is &lt;2.9.4-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517648" version="1" comment="libxml2-2-32bit is &lt;2.9.4-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517649" version="1" comment="libxml2-tools is &lt;2.9.4-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517650" version="1" comment="python-libxml2 is &lt;2.9.4-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518993" version="1" comment="shotwell is &lt;0.22.0+git.20160103-15.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518994" version="1" comment="shotwell-lang is &lt;0.22.0+git.20160103-15.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172771" version="1" comment="shotwell is &lt;0.22.0+git.20160103-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172772" version="1" comment="shotwell-lang is &lt;0.22.0+git.20160103-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338946" version="1" comment="xmlsec1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518420" version="1" comment="evince is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518421" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518422" version="1" comment="evince-lang is &lt;3.20.2-6.19.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518423" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518424" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518425" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518426" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518427" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518428" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518429" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518430" version="1" comment="libevview3-3 is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518431" version="1" comment="nautilus-evince is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518432" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518433" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518021" version="1" comment="curl is &lt;7.37.0-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518022" version="1" comment="libcurl4 is &lt;7.37.0-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518023" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518005" version="1" comment="kernel-default is &lt;4.4.74-92.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518006" version="1" comment="kernel-default-devel is &lt;4.4.74-92.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518007" version="1" comment="kernel-default-extra is &lt;4.4.74-92.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518008" version="1" comment="kernel-devel is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518009" version="1" comment="kernel-macros is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518010" version="1" comment="kernel-source is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518011" version="1" comment="kernel-syms is &lt;4.4.74-92.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519250" version="1" comment="kernel-default is &lt;4.4.82-6.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519251" version="1" comment="kernel-default-devel is &lt;4.4.82-6.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519252" version="1" comment="kernel-default-extra is &lt;4.4.82-6.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519253" version="1" comment="kernel-devel is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519254" version="1" comment="kernel-macros is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519255" version="1" comment="kernel-source is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519256" version="1" comment="kernel-syms is &lt;4.4.82-6.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334025" version="1" comment="webkitgtk3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520990" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520991" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520992" version="1" comment="python is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520993" version="1" comment="python-base is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520994" version="1" comment="python-curses is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520995" version="1" comment="python-devel is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520996" version="1" comment="python-tk is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520997" version="1" comment="python-xml is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520638" version="1" comment="evince is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520639" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520640" version="1" comment="evince-lang is &lt;3.20.2-6.22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520641" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520642" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520643" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520644" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520645" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520646" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520647" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520648" version="1" comment="libevview3-3 is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520649" version="1" comment="nautilus-evince is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520650" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520651" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338949" version="1" comment="xrootd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334026" version="1" comment="file is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518098" version="1" comment="kernel-default is &lt;4.4.74-92.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518099" version="1" comment="kernel-default-devel is &lt;4.4.74-92.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518100" version="1" comment="kernel-default-extra is &lt;4.4.74-92.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518101" version="1" comment="kernel-devel is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518102" version="1" comment="kernel-macros is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518103" version="1" comment="kernel-source is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518104" version="1" comment="kernel-syms is &lt;4.4.74-92.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519456" version="1" comment="kernel-default is &lt;4.4.82-6.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519457" version="1" comment="kernel-default-devel is &lt;4.4.82-6.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519458" version="1" comment="kernel-default-extra is &lt;4.4.82-6.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519459" version="1" comment="kernel-devel is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519460" version="1" comment="kernel-macros is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519461" version="1" comment="kernel-source is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519462" version="1" comment="kernel-syms is &lt;4.4.82-6.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518248" version="1" comment="kernel-default is &lt;4.4.90-92.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518249" version="1" comment="kernel-default-devel is &lt;4.4.90-92.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518250" version="1" comment="kernel-default-extra is &lt;4.4.90-92.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518251" version="1" comment="kernel-devel is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518252" version="1" comment="kernel-macros is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518253" version="1" comment="kernel-source is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518254" version="1" comment="kernel-syms is &lt;4.4.90-92.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519538" version="1" comment="kernel-default is &lt;4.4.92-6.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519539" version="1" comment="kernel-default-devel is &lt;4.4.92-6.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519540" version="1" comment="kernel-default-extra is &lt;4.4.92-6.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519541" version="1" comment="kernel-devel is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519542" version="1" comment="kernel-macros is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519543" version="1" comment="kernel-source is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519544" version="1" comment="kernel-syms is &lt;4.4.92-6.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518234" version="1" comment="curl is &lt;7.37.0-37.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518235" version="1" comment="libcurl4 is &lt;7.37.0-37.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518236" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519545" version="1" comment="libvirt is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519546" version="1" comment="libvirt-admin is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519547" version="1" comment="libvirt-client is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519548" version="1" comment="libvirt-daemon is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519549" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519550" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519551" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519552" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519553" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519554" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519555" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519556" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519557" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519558" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519559" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519560" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519561" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519562" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519563" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519564" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519565" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519566" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519567" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519568" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519569" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519570" version="1" comment="libvirt-doc is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519571" version="1" comment="libvirt-libs is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517657" version="1" comment="kernel-default is &lt;4.4.59-92.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517658" version="1" comment="kernel-default-devel is &lt;4.4.59-92.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517659" version="1" comment="kernel-default-extra is &lt;4.4.59-92.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517660" version="1" comment="kernel-devel is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517661" version="1" comment="kernel-macros is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517662" version="1" comment="kernel-source is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517663" version="1" comment="kernel-syms is &lt;4.4.59-92.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517899" version="1" comment="kernel-default is &lt;4.4.74-92.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517900" version="1" comment="kernel-default-devel is &lt;4.4.74-92.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517901" version="1" comment="kernel-default-extra is &lt;4.4.74-92.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517902" version="1" comment="kernel-devel is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517903" version="1" comment="kernel-macros is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517904" version="1" comment="kernel-source is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517905" version="1" comment="kernel-syms is &lt;4.4.74-92.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518738" version="1" comment="glibc is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518739" version="1" comment="glibc-32bit is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518740" version="1" comment="glibc-devel is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518741" version="1" comment="glibc-devel-32bit is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518742" version="1" comment="glibc-i18ndata is &lt;2.22-61.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518743" version="1" comment="glibc-locale is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518744" version="1" comment="glibc-locale-32bit is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518745" version="1" comment="nscd is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517460" version="1" comment="sudo is &lt;1.8.10p3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518692" version="1" comment="sudo is &lt;1.8.10p3-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517697" version="1" comment="sudo is &lt;1.8.10p3-10.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517701" version="1" comment="libcares2 is &lt;1.9.1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517702" version="1" comment="libcares2-32bit is &lt;1.9.1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518389" version="1" comment="kernel-default is &lt;4.4.90-92.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518390" version="1" comment="kernel-default-devel is &lt;4.4.90-92.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518391" version="1" comment="kernel-default-extra is &lt;4.4.90-92.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518392" version="1" comment="kernel-devel is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518393" version="1" comment="kernel-macros is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518394" version="1" comment="kernel-source is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518395" version="1" comment="kernel-syms is &lt;4.4.90-92.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519630" version="1" comment="kernel-default is &lt;4.4.92-6.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519631" version="1" comment="kernel-default-devel is &lt;4.4.92-6.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519632" version="1" comment="kernel-default-extra is &lt;4.4.92-6.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519633" version="1" comment="kernel-devel is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519634" version="1" comment="kernel-macros is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519635" version="1" comment="kernel-source is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519636" version="1" comment="kernel-syms is &lt;4.4.92-6.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519055" version="1" comment="glibc is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519056" version="1" comment="glibc-32bit is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519057" version="1" comment="glibc-devel is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519058" version="1" comment="glibc-devel-32bit is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519059" version="1" comment="glibc-i18ndata is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519060" version="1" comment="glibc-locale is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519061" version="1" comment="glibc-locale-32bit is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519062" version="1" comment="nscd is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518413" version="1" comment="kernel-default is &lt;4.4.103-92.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518414" version="1" comment="kernel-default-devel is &lt;4.4.103-92.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518415" version="1" comment="kernel-default-extra is &lt;4.4.103-92.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518416" version="1" comment="kernel-devel is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518417" version="1" comment="kernel-macros is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518418" version="1" comment="kernel-source is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518419" version="1" comment="kernel-syms is &lt;4.4.103-92.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519637" version="1" comment="kernel-default is &lt;4.4.103-6.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519638" version="1" comment="kernel-default-devel is &lt;4.4.103-6.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519639" version="1" comment="kernel-default-extra is &lt;4.4.103-6.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519640" version="1" comment="kernel-devel is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519641" version="1" comment="kernel-macros is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519642" version="1" comment="kernel-source is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519643" version="1" comment="kernel-syms is &lt;4.4.103-6.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519786" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519787" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519788" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519789" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519790" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519791" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518982" version="1" comment="ImageMagick is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518983" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518984" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518985" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518986" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519662" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519663" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519664" version="1" comment="libpoppler60 is &lt;0.43.0-16.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519665" version="1" comment="poppler-tools is &lt;0.43.0-16.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520882" version="1" comment="ImageMagick is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520883" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520884" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520885" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520886" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518024" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.144-27.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518025" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.144-27.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518851" version="1" comment="libmysqlclient18 is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518852" version="1" comment="libmysqlclient18-32bit is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518853" version="1" comment="libmysqlclient_r18 is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518854" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518855" version="1" comment="mariadb is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518856" version="1" comment="mariadb-client is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518857" version="1" comment="mariadb-errormessages is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518264" version="1" comment="qemu is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518265" version="1" comment="qemu-block-curl is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518266" version="1" comment="qemu-ipxe is &lt;1.0.0-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518267" version="1" comment="qemu-kvm is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518268" version="1" comment="qemu-seabios is &lt;1.9.1-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518269" version="1" comment="qemu-sgabios is &lt;8-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518270" version="1" comment="qemu-tools is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518271" version="1" comment="qemu-vgabios is &lt;1.9.1-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518272" version="1" comment="qemu-x86 is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519444" version="1" comment="qemu is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519445" version="1" comment="qemu-block-curl is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519446" version="1" comment="qemu-ipxe is &lt;1.0.0-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519447" version="1" comment="qemu-kvm is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519448" version="1" comment="qemu-seabios is &lt;1.10.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519449" version="1" comment="qemu-sgabios is &lt;8-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519450" version="1" comment="qemu-tools is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519451" version="1" comment="qemu-vgabios is &lt;1.10.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519452" version="1" comment="qemu-x86 is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519438" version="1" comment="xen is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519439" version="1" comment="xen-libs is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519440" version="1" comment="xen-libs-32bit is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519189" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517974" version="1" comment="libncurses5 is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517975" version="1" comment="libncurses5-32bit is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517976" version="1" comment="libncurses6 is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517977" version="1" comment="libncurses6-32bit is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517978" version="1" comment="ncurses-devel is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517979" version="1" comment="ncurses-utils is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517980" version="1" comment="tack is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517981" version="1" comment="terminfo is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517982" version="1" comment="terminfo-base is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170445" version="1" comment="libncurses5 is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170446" version="1" comment="libncurses5-32bit is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170447" version="1" comment="libncurses6 is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170448" version="1" comment="libncurses6-32bit is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170450" version="1" comment="ncurses-devel is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170451" version="1" comment="ncurses-utils is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170452" version="1" comment="tack is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170453" version="1" comment="terminfo is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170454" version="1" comment="terminfo-base is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518973" version="1" comment="puppet is &lt;3.8.5-15.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520080" version="1" comment="gnutls is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520081" version="1" comment="libgnutls28 is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520082" version="1" comment="libgnutls28-32bit is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519190" version="1" comment="ImageMagick is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519191" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519192" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519193" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519194" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520525" version="1" comment="drm-kmp-default is &lt;4.9.33_k4.4.114_94.11-4.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519572" version="1" comment="qemu is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519573" version="1" comment="qemu-block-curl is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519574" version="1" comment="qemu-ipxe is &lt;1.0.0-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519575" version="1" comment="qemu-kvm is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519576" version="1" comment="qemu-seabios is &lt;1.10.2-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519577" version="1" comment="qemu-sgabios is &lt;8-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519578" version="1" comment="qemu-tools is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519579" version="1" comment="qemu-vgabios is &lt;1.10.2-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519580" version="1" comment="qemu-x86 is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519755" version="1" comment="ImageMagick is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519756" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519757" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519758" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519759" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517906" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517907" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521147" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521148" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521149" version="1" comment="sqlite3 is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518825" version="1" comment="ImageMagick is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518826" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518827" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518828" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518829" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519204" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519205" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519206" version="1" comment="libdcerpc0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519207" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519208" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519209" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519210" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519211" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519212" version="1" comment="libndr-standard0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519213" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519214" version="1" comment="libndr0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519215" version="1" comment="libndr0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519216" version="1" comment="libnetapi0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519217" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519218" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519219" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519220" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519221" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519222" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519223" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519224" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519225" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519226" version="1" comment="libsamba-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519227" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519228" version="1" comment="libsamdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519229" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519230" version="1" comment="libsmbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519231" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519232" version="1" comment="libsmbconf0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519233" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519234" version="1" comment="libsmbldap0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519235" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519236" version="1" comment="libtevent-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519237" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519238" version="1" comment="libwbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519239" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519240" version="1" comment="samba is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519241" version="1" comment="samba-client is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519242" version="1" comment="samba-client-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519243" version="1" comment="samba-doc is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519244" version="1" comment="samba-libs is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519245" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519246" version="1" comment="samba-winbind is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519247" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518238" version="1" comment="tcpdump is &lt;4.9.2-14.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518974" version="1" comment="ImageMagick is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518975" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518976" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518977" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518978" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518012" version="1" comment="strongswan is &lt;5.1.3-26.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518013" version="1" comment="strongswan-doc is &lt;5.1.3-26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518014" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518015" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518403" version="1" comment="ImageMagick is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518404" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518405" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518406" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518407" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338951" version="1" comment="vorbis-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518028" version="1" comment="ImageMagick is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518029" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518030" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518031" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518032" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517958" version="1" comment="libwireshark8 is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517959" version="1" comment="libwiretap6 is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517960" version="1" comment="libwscodecs1 is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517961" version="1" comment="libwsutil7 is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517962" version="1" comment="wireshark is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517963" version="1" comment="wireshark-gtk is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518184" version="1" comment="krb5 is &lt;1.12.5-40.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518185" version="1" comment="krb5-32bit is &lt;1.12.5-40.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518186" version="1" comment="krb5-client is &lt;1.12.5-40.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517997" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.18-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517998" version="1" comment="librsvg-2-2 is &lt;2.40.18-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517999" version="1" comment="librsvg-2-2-32bit is &lt;2.40.18-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518000" version="1" comment="rsvg-view is &lt;2.40.18-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519121" version="1" comment="ImageMagick is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519122" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519123" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519124" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519125" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520159" version="1" comment="ImageMagick is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520160" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520161" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520162" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520163" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520381" version="1" comment="libexiv2-12 is &lt;0.23-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520255" version="1" comment="libtiff5 is &lt;4.0.9-44.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520256" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520143" version="1" comment="cups-filters is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520144" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520145" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520146" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520147" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512398" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518105" version="1" comment="cpp48 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518106" version="1" comment="gcc48 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518107" version="1" comment="gcc48-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518108" version="1" comment="gcc48-c++ is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518109" version="1" comment="gcc48-gij is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518110" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518111" version="1" comment="gcc48-info is &lt;4.8.5-31.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518112" version="1" comment="libasan0 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518113" version="1" comment="libasan0-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518114" version="1" comment="libgcj48 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518115" version="1" comment="libgcj48-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518116" version="1" comment="libgcj48-jar is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518117" version="1" comment="libgcj_bc1 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518118" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518119" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518942" version="1" comment="glibc is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518943" version="1" comment="glibc-32bit is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518944" version="1" comment="glibc-devel is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518945" version="1" comment="glibc-devel-32bit is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518946" version="1" comment="glibc-i18ndata is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518947" version="1" comment="glibc-locale is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518948" version="1" comment="glibc-locale-32bit is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518949" version="1" comment="nscd is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518998" version="1" comment="glibc is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518999" version="1" comment="glibc-32bit is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519000" version="1" comment="glibc-devel is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519001" version="1" comment="glibc-devel-32bit is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519002" version="1" comment="glibc-i18ndata is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519003" version="1" comment="glibc-locale is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519004" version="1" comment="glibc-locale-32bit is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519005" version="1" comment="nscd is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518296" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518140" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518141" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518142" version="1" comment="libdcerpc0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518143" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518144" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518145" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518146" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518147" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518148" version="1" comment="libndr-standard0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518149" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518150" version="1" comment="libndr0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518151" version="1" comment="libndr0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518152" version="1" comment="libnetapi0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518153" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518154" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518155" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518156" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518157" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518158" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518159" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518160" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518161" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518162" version="1" comment="libsamba-util0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518163" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518164" version="1" comment="libsamdb0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518165" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518166" version="1" comment="libsmbclient0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518167" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518168" version="1" comment="libsmbconf0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518169" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518170" version="1" comment="libsmbldap0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518171" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518172" version="1" comment="libtevent-util0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518173" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518174" version="1" comment="libwbclient0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518175" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518176" version="1" comment="samba is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518177" version="1" comment="samba-client is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518178" version="1" comment="samba-client-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518179" version="1" comment="samba-doc is &lt;4.4.2-38.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518180" version="1" comment="samba-libs is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518181" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518182" version="1" comment="samba-winbind is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518183" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519586" version="1" comment="libdcerpc-binding0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519587" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519588" version="1" comment="libdcerpc0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519589" version="1" comment="libdcerpc0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519590" version="1" comment="libndr-krb5pac0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519591" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519592" version="1" comment="libndr-nbt0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519593" version="1" comment="libndr-nbt0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519594" version="1" comment="libndr-standard0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519595" version="1" comment="libndr-standard0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519596" version="1" comment="libndr0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519597" version="1" comment="libndr0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519598" version="1" comment="libnetapi0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519599" version="1" comment="libnetapi0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519600" version="1" comment="libsamba-credentials0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519601" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519602" version="1" comment="libsamba-errors0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519603" version="1" comment="libsamba-errors0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519604" version="1" comment="libsamba-hostconfig0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519605" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519606" version="1" comment="libsamba-passdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519607" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519608" version="1" comment="libsamba-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519609" version="1" comment="libsamba-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519610" version="1" comment="libsamdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519611" version="1" comment="libsamdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519612" version="1" comment="libsmbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519613" version="1" comment="libsmbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519614" version="1" comment="libsmbconf0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519615" version="1" comment="libsmbconf0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519616" version="1" comment="libsmbldap0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519617" version="1" comment="libsmbldap0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519618" version="1" comment="libtevent-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519619" version="1" comment="libtevent-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519620" version="1" comment="libwbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519621" version="1" comment="libwbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519622" version="1" comment="samba is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519623" version="1" comment="samba-client is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519624" version="1" comment="samba-client-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519625" version="1" comment="samba-doc is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519626" version="1" comment="samba-libs is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519627" version="1" comment="samba-libs-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519628" version="1" comment="samba-winbind is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519629" version="1" comment="samba-winbind-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334029" version="1" comment="gdm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518237" version="1" comment="openvpn is &lt;2.3.8-16.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519164" version="1" comment="postgresql94 is &lt;9.4.15-21.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518273" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518274" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518275" version="1" comment="libsss_sudo is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518276" version="1" comment="python-sssd-config is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518277" version="1" comment="sssd is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518278" version="1" comment="sssd-32bit is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518279" version="1" comment="sssd-ad is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518280" version="1" comment="sssd-ipa is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518281" version="1" comment="sssd-krb5 is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518282" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518283" version="1" comment="sssd-ldap is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518284" version="1" comment="sssd-proxy is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518285" version="1" comment="sssd-tools is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519582" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518311" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518312" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520595" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520596" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520597" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520598" version="1" comment="libspice-controller0 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520599" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520600" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518798" version="1" comment="clamav is &lt;0.99.3-33.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518294" version="1" comment="shadow is &lt;4.2.1-27.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334031" version="1" comment="libsndfile is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518776" version="1" comment="ImageMagick is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518777" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518778" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518779" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518780" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518979" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518980" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518981" version="1" comment="openexr is &lt;2.1.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522656" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522657" version="1" comment="libpng16-16-32bit is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334033" version="1" comment="taglib is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521540" version="1" comment="ImageMagick is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521541" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521542" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521543" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521544" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521545" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521546" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518087" version="1" comment="cvs is &lt;1.12.12-182.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518319" version="1" comment="perl is &lt;5.18.2-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518320" version="1" comment="perl-32bit is &lt;5.18.2-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518321" version="1" comment="perl-base is &lt;5.18.2-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518322" version="1" comment="perl-doc is &lt;5.18.2-12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334034" version="1" comment="libzip is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520238" version="1" comment="ImageMagick is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520239" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520240" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520241" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520242" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518233" version="1" comment="wpa_supplicant is &lt;2.2-15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518323" version="1" comment="kernel-firmware is &lt;20170530-21.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518324" version="1" comment="ucode-amd is &lt;20170530-21.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512204" version="1" comment="kernel-firmware is &lt;20180525-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512205" version="1" comment="ucode-amd is &lt;20180525-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518255" version="1" comment="wget is &lt;1.14-21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519039" version="1" comment="kernel-default is &lt;4.4.120-92.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519040" version="1" comment="kernel-default-devel is &lt;4.4.120-92.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519041" version="1" comment="kernel-default-extra is &lt;4.4.120-92.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519042" version="1" comment="kernel-devel is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519043" version="1" comment="kernel-macros is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519044" version="1" comment="kernel-source is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519045" version="1" comment="kernel-syms is &lt;4.4.120-92.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520588" version="1" comment="kernel-default is &lt;4.4.120-94.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520589" version="1" comment="kernel-default-devel is &lt;4.4.120-94.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520590" version="1" comment="kernel-default-extra is &lt;4.4.120-94.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520591" version="1" comment="kernel-devel is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520592" version="1" comment="kernel-macros is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520593" version="1" comment="kernel-source is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520594" version="1" comment="kernel-syms is &lt;4.4.120-94.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518765" version="1" comment="libvpx1 is &lt;1.3.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518766" version="1" comment="libvpx1-32bit is &lt;1.3.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518767" version="1" comment="vpx-tools is &lt;1.3.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169974" version="1" comment="libvpx1 is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169975" version="1" comment="libvpx1-32bit is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169976" version="1" comment="vpx-tools is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521669" version="1" comment="qemu is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521670" version="1" comment="qemu-block-curl is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521671" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521672" version="1" comment="qemu-kvm is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521673" version="1" comment="qemu-seabios is &lt;1.10.2-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521674" version="1" comment="qemu-sgabios is &lt;8-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521675" version="1" comment="qemu-tools is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521676" version="1" comment="qemu-vgabios is &lt;1.10.2-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521677" version="1" comment="qemu-x86 is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338972" version="1" comment="dnsmasq is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518822" version="1" comment="libXfont1 is &lt;1.5.1-11.3.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518801" version="1" comment="libncurses5 is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518802" version="1" comment="libncurses5-32bit is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518803" version="1" comment="libncurses6 is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518804" version="1" comment="libncurses6-32bit is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518805" version="1" comment="ncurses-devel is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518806" version="1" comment="ncurses-utils is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518807" version="1" comment="tack is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518808" version="1" comment="terminfo is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518809" version="1" comment="terminfo-base is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518408" version="1" comment="libraw9 is &lt;0.15.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518133" version="1" comment="liblouis-data is &lt;2.6.4-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518134" version="1" comment="liblouis9 is &lt;2.6.4-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518135" version="1" comment="python3-louis is &lt;2.6.4-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512349" version="1" comment="liblouis-data is &lt;2.6.4-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512350" version="1" comment="liblouis9 is &lt;2.6.4-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512351" version="1" comment="python3-louis is &lt;2.6.4-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518125" version="1" comment="libwireshark8 is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518126" version="1" comment="libwiretap6 is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518127" version="1" comment="libwscodecs1 is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518128" version="1" comment="libwsutil7 is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518129" version="1" comment="wireshark is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518130" version="1" comment="wireshark-gtk is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338973" version="1" comment="webkit2gtk3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520266" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520267" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520268" version="1" comment="libwebkit2gtk3-lang is &lt;2.20.3-2.23.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520269" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520270" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520271" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338974" version="1" comment="libidn is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520601" version="1" comment="libidn11 is &lt;1.28-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520602" version="1" comment="libidn11-32bit is &lt;1.28-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518124" version="1" comment="libzip2 is &lt;0.11.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520959" version="1" comment="libvorbis0 is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520960" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520961" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520962" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520963" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520964" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518263" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166502" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518830" version="1" comment="libsndfile1 is &lt;1.0.25-36.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518831" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518095" version="1" comment="xen is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518096" version="1" comment="xen-libs is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518097" version="1" comment="xen-libs-32bit is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519453" version="1" comment="xen is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519454" version="1" comment="xen-libs is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519455" version="1" comment="xen-libs-32bit is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334040" version="1" comment="dcraw is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518120" version="1" comment="emacs is &lt;24.3-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518121" version="1" comment="emacs-info is &lt;24.3-25.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518122" version="1" comment="emacs-x11 is &lt;24.3-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518123" version="1" comment="etags is &lt;24.3-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518138" version="1" comment="dnsmasq is &lt;2.78-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518295" version="1" comment="libpoppler44 is &lt;0.24.4-14.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519816" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.3.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519817" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.3.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519818" version="1" comment="libnautilus-extension1-32bit is &lt;3.20.3-23.3.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519819" version="1" comment="nautilus is &lt;3.20.3-23.3.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519820" version="1" comment="nautilus-lang is &lt;3.20.3-23.3.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512172" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512173" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512174" version="1" comment="libnautilus-extension1-32bit is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512175" version="1" comment="nautilus is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512176" version="1" comment="nautilus-lang is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518785" version="1" comment="libvorbis0 is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518786" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518787" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518788" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518789" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518790" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519840" version="1" comment="libofx is &lt;0.9.9-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519841" version="1" comment="libofx6 is &lt;0.9.9-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512360" version="1" comment="libofx is &lt;0.9.9-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512361" version="1" comment="libofx6 is &lt;0.9.9-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518318" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518325" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518326" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518327" version="1" comment="libdcerpc0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518328" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518329" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518330" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518331" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518332" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518333" version="1" comment="libndr-standard0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518334" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518335" version="1" comment="libndr0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518336" version="1" comment="libndr0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518337" version="1" comment="libnetapi0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518338" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518339" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518340" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518341" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518342" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518343" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518344" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518345" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518346" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518347" version="1" comment="libsamba-util0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518348" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518349" version="1" comment="libsamdb0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518350" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518351" version="1" comment="libsmbclient0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518352" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518353" version="1" comment="libsmbconf0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518354" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518355" version="1" comment="libsmbldap0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518356" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518357" version="1" comment="libtevent-util0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518358" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518359" version="1" comment="libwbclient0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518360" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518361" version="1" comment="samba is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518362" version="1" comment="samba-client is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518363" version="1" comment="samba-client-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518364" version="1" comment="samba-doc is &lt;4.4.2-38.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518365" version="1" comment="samba-libs is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518366" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518367" version="1" comment="samba-winbind is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518368" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334297" version="1" comment="poppler is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522030" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522031" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522032" version="1" comment="openexr is &lt;2.1.0-6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520279" version="1" comment="ImageMagick is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520280" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520281" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520282" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520283" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518286" version="1" comment="krb5 is &lt;1.12.5-40.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518287" version="1" comment="krb5-32bit is &lt;1.12.5-40.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518288" version="1" comment="krb5-client is &lt;1.12.5-40.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518409" version="1" comment="libecpg6 is &lt;9.6.6-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518410" version="1" comment="libpq5 is &lt;9.6.6-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518411" version="1" comment="libpq5-32bit is &lt;9.6.6-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518412" version="1" comment="postgresql96 is &lt;9.6.6-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334092" version="1" comment="liblouis is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521547" version="1" comment="dnsmasq is &lt;2.78-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518839" version="1" comment="spice-vdagent is &lt;0.16.0-8.5.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170918" version="1" comment="spice-vdagent is &lt;0.16.0-8.5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519063" version="1" comment="qemu is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519064" version="1" comment="qemu-block-curl is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519065" version="1" comment="qemu-ipxe is &lt;1.0.0-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519066" version="1" comment="qemu-kvm is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519067" version="1" comment="qemu-seabios is &lt;1.9.1-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519068" version="1" comment="qemu-sgabios is &lt;8-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519069" version="1" comment="qemu-tools is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519070" version="1" comment="qemu-vgabios is &lt;1.9.1-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519071" version="1" comment="qemu-x86 is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520579" version="1" comment="qemu is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520580" version="1" comment="qemu-block-curl is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520581" version="1" comment="qemu-ipxe is &lt;1.0.0-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520582" version="1" comment="qemu-kvm is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520583" version="1" comment="qemu-seabios is &lt;1.10.2-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520584" version="1" comment="qemu-sgabios is &lt;8-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520585" version="1" comment="qemu-tools is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520586" version="1" comment="qemu-vgabios is &lt;1.10.2-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520587" version="1" comment="qemu-x86 is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518883" version="1" comment="kernel-default is &lt;4.4.114-92.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518884" version="1" comment="kernel-default-devel is &lt;4.4.114-92.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518885" version="1" comment="kernel-default-extra is &lt;4.4.114-92.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518886" version="1" comment="kernel-devel is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518887" version="1" comment="kernel-macros is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518888" version="1" comment="kernel-source is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518889" version="1" comment="kernel-syms is &lt;4.4.114-92.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520366" version="1" comment="kernel-default is &lt;4.4.114-94.11.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520367" version="1" comment="kernel-default-devel is &lt;4.4.114-94.11.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520368" version="1" comment="kernel-default-extra is &lt;4.4.114-94.11.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520369" version="1" comment="kernel-devel is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520370" version="1" comment="kernel-macros is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520371" version="1" comment="kernel-source is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520372" version="1" comment="kernel-syms is &lt;4.4.114-94.11.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334354" version="1" comment="gnome-session is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338983" version="1" comment="xdg-user-dirs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518239" version="1" comment="libwireshark8 is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518240" version="1" comment="libwiretap6 is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518241" version="1" comment="libwscodecs1 is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518242" version="1" comment="libwsutil7 is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518243" version="1" comment="wireshark is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518244" version="1" comment="wireshark-gtk is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518832" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518833" version="1" comment="libjpeg62 is &lt;62.2.0-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518834" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518835" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518836" version="1" comment="libjpeg8 is &lt;8.1.2-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518837" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518838" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518378" version="1" comment="xen is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518379" version="1" comment="xen-libs is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518380" version="1" comment="xen-libs-32bit is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519583" version="1" comment="xen is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519584" version="1" comment="xen-libs is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519585" version="1" comment="xen-libs-32bit is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334301" version="1" comment="cups is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518245" version="1" comment="xen is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518246" version="1" comment="xen-libs is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518247" version="1" comment="xen-libs-32bit is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518951" version="1" comment="xen is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518952" version="1" comment="xen-libs is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518953" version="1" comment="xen-libs-32bit is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520450" version="1" comment="xen is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520451" version="1" comment="xen-libs is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520452" version="1" comment="xen-libs-32bit is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512640" version="1" comment="yubikey-manager is &lt;0.6.0-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518256" version="1" comment="SuSEfirewall2 is &lt;3.6.312-2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519581" version="1" comment="SuSEfirewall2 is &lt;3.6.312.333-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512022" version="1" comment="SuSEfirewall2 is &lt;3.6.312.333-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338984" version="1" comment="busybox is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518810" version="1" comment="libsystemd0 is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518811" version="1" comment="libsystemd0-32bit is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518812" version="1" comment="libudev1 is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518813" version="1" comment="libudev1-32bit is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518814" version="1" comment="systemd is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518815" version="1" comment="systemd-32bit is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518816" version="1" comment="systemd-bash-completion is &lt;228-150.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518817" version="1" comment="systemd-sysvinit is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518818" version="1" comment="udev is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338986" version="1" comment="rsync is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521793" version="1" comment="kernel-default is &lt;4.12.14-95.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521794" version="1" comment="kernel-default-devel is &lt;4.12.14-95.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521795" version="1" comment="kernel-default-extra is &lt;4.12.14-95.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521796" version="1" comment="kernel-devel is &lt;4.12.14-95.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521797" version="1" comment="kernel-macros is &lt;4.12.14-95.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521798" version="1" comment="kernel-source is &lt;4.12.14-95.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521799" version="1" comment="kernel-syms is &lt;4.12.14-95.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520319" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520320" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520321" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520322" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520323" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520324" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520325" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520326" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520327" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520328" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520329" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520330" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520331" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520332" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520333" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520334" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519176" version="1" comment="rsync is &lt;3.1.0-13.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512240" version="1" comment="libXfont2-2 is &lt;2.0.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518387" version="1" comment="libXcursor1 is &lt;1.1.14-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518388" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522066" version="1" comment="tcpdump is &lt;4.9.2-14.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521008" version="1" comment="ceph-common is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521009" version="1" comment="libcephfs2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521010" version="1" comment="librados2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521011" version="1" comment="libradosstriper1 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521012" version="1" comment="librbd1 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521013" version="1" comment="librgw2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521014" version="1" comment="python-cephfs is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521015" version="1" comment="python-rados is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521016" version="1" comment="python-rbd is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521017" version="1" comment="python-rgw is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512053" version="1" comment="ceph-common is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512054" version="1" comment="libcephfs2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512055" version="1" comment="librados2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512056" version="1" comment="libradosstriper1 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512057" version="1" comment="librbd1 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512058" version="1" comment="librgw2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512059" version="1" comment="python-cephfs is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512060" version="1" comment="python-rados is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512061" version="1" comment="python-rbd is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512062" version="1" comment="python-rgw is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518764" version="1" comment="procmail is &lt;3.22-269.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334357" version="1" comment="ncurses is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518797" version="1" comment="transfig is &lt;3.2.5e-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170244" version="1" comment="transfig is &lt;3.2.5e-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518434" version="1" comment="libwireshark8 is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518435" version="1" comment="libwiretap6 is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518436" version="1" comment="libwscodecs1 is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518437" version="1" comment="libwsutil7 is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518438" version="1" comment="wireshark is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518439" version="1" comment="wireshark-gtk is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519838" version="1" comment="libsndfile1 is &lt;1.0.25-36.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519839" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334048" version="1" comment="evolution is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334049" version="1" comment="mutt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520427" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520428" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520429" version="1" comment="openldap2-client is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519726" version="1" comment="kernel-default is &lt;4.4.138-94.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519727" version="1" comment="kernel-default-devel is &lt;4.4.138-94.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519728" version="1" comment="kernel-default-extra is &lt;4.4.138-94.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519729" version="1" comment="kernel-devel is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519730" version="1" comment="kernel-macros is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519731" version="1" comment="kernel-source is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519732" version="1" comment="kernel-syms is &lt;4.4.138-94.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522658" version="1" comment="gimp is &lt;2.8.18-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522659" version="1" comment="gimp-lang is &lt;2.8.18-9.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522660" version="1" comment="gimp-plugins-python is &lt;2.8.18-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522661" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522662" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518756" version="1" comment="kernel-default is &lt;4.4.103-92.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518757" version="1" comment="kernel-default-devel is &lt;4.4.103-92.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518758" version="1" comment="kernel-default-extra is &lt;4.4.103-92.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518759" version="1" comment="kernel-devel is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518760" version="1" comment="kernel-macros is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518761" version="1" comment="kernel-source is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518762" version="1" comment="kernel-syms is &lt;4.4.103-92.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519733" version="1" comment="kernel-default is &lt;4.4.103-6.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519734" version="1" comment="kernel-default-devel is &lt;4.4.103-6.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519735" version="1" comment="kernel-default-extra is &lt;4.4.103-6.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519736" version="1" comment="kernel-devel is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519737" version="1" comment="kernel-macros is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519738" version="1" comment="kernel-source is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519739" version="1" comment="kernel-syms is &lt;4.4.103-6.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520128" version="1" comment="openslp is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520129" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518768" version="1" comment="libwireshark8 is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518769" version="1" comment="libwiretap6 is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518770" version="1" comment="libwscodecs1 is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518771" version="1" comment="libwsutil7 is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518772" version="1" comment="wireshark is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518773" version="1" comment="wireshark-gtk is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520887" version="1" comment="libtiff5 is &lt;4.0.9-44.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520888" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519049" version="1" comment="libwireshark8 is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519050" version="1" comment="libwiretap6 is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519051" version="1" comment="libwscodecs1 is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519052" version="1" comment="libwsutil7 is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519053" version="1" comment="wireshark is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519054" version="1" comment="wireshark-gtk is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518963" version="1" comment="libsystemd0 is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518964" version="1" comment="libsystemd0-32bit is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518965" version="1" comment="libudev1 is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518966" version="1" comment="libudev1-32bit is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518967" version="1" comment="systemd is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518968" version="1" comment="systemd-32bit is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518969" version="1" comment="systemd-bash-completion is &lt;228-150.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518970" version="1" comment="systemd-sysvinit is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518971" version="1" comment="udev is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518987" version="1" comment="cups is &lt;1.7.5-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518988" version="1" comment="cups-client is &lt;1.7.5-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518989" version="1" comment="cups-libs is &lt;1.7.5-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518990" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519014" version="1" comment="libcdio14 is &lt;0.90-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519015" version="1" comment="libcdio14-32bit is &lt;0.90-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519016" version="1" comment="libiso9660-8 is &lt;0.90-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173007" version="1" comment="libcdio14 is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173008" version="1" comment="libcdio14-32bit is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173009" version="1" comment="libiso9660-8 is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519801" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519802" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520634" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519803" version="1" comment="python is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519804" version="1" comment="python-base is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519805" version="1" comment="python-curses is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519806" version="1" comment="python-devel is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519807" version="1" comment="python-tk is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519808" version="1" comment="python-xml is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520635" version="1" comment="python3 is &lt;3.4.6-25.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520636" version="1" comment="python3-base is &lt;3.4.6-25.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520637" version="1" comment="python3-curses is &lt;3.4.6-25.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520272" version="1" comment="libexempi3 is &lt;2.2.1-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512308" version="1" comment="libexempi3 is &lt;2.2.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519856" version="1" comment="cups is &lt;1.7.5-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519857" version="1" comment="cups-client is &lt;1.7.5-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519858" version="1" comment="cups-libs is &lt;1.7.5-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519859" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520660" version="1" comment="kernel-default is &lt;4.4.126-94.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520661" version="1" comment="kernel-default-devel is &lt;4.4.126-94.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520662" version="1" comment="kernel-default-extra is &lt;4.4.126-94.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520663" version="1" comment="kernel-devel is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520664" version="1" comment="kernel-macros is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520665" version="1" comment="kernel-source is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520666" version="1" comment="kernel-syms is &lt;4.4.126-94.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520155" version="1" comment="libxml2-2 is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520156" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520157" version="1" comment="libxml2-tools is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520158" version="1" comment="python-libxml2 is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519644" version="1" comment="xdg-utils is &lt;20140630-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519646" version="1" comment="glibc is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519647" version="1" comment="glibc-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519648" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519649" version="1" comment="glibc-devel-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519650" version="1" comment="glibc-i18ndata is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519651" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519652" version="1" comment="glibc-locale-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519653" version="1" comment="nscd is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519954" version="1" comment="kernel-default is &lt;4.4.143-94.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519955" version="1" comment="kernel-default-devel is &lt;4.4.143-94.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519956" version="1" comment="kernel-default-extra is &lt;4.4.143-94.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519957" version="1" comment="kernel-devel is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519958" version="1" comment="kernel-macros is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519959" version="1" comment="kernel-source is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519960" version="1" comment="kernel-syms is &lt;4.4.143-94.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522205" version="1" comment="kernel-default is &lt;4.12.14-95.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522206" version="1" comment="kernel-default-devel is &lt;4.12.14-95.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522207" version="1" comment="kernel-default-extra is &lt;4.12.14-95.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522208" version="1" comment="kernel-devel is &lt;4.12.14-95.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522209" version="1" comment="kernel-macros is &lt;4.12.14-95.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522210" version="1" comment="kernel-source is &lt;4.12.14-95.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522211" version="1" comment="kernel-syms is &lt;4.12.14-95.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522295" version="1" comment="kernel-default is &lt;4.12.14-95.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522296" version="1" comment="kernel-default-devel is &lt;4.12.14-95.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522297" version="1" comment="kernel-default-extra is &lt;4.12.14-95.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522298" version="1" comment="kernel-devel is &lt;4.12.14-95.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522299" version="1" comment="kernel-macros is &lt;4.12.14-95.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522300" version="1" comment="kernel-source is &lt;4.12.14-95.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522301" version="1" comment="kernel-syms is &lt;4.12.14-95.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517996" version="1" comment="puppet is &lt;3.8.5-15.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522390" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522391" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522392" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518257" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518258" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518259" version="1" comment="libwebkit2gtk3-lang is &lt;2.18.0-2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518260" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518261" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518262" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521534" version="1" comment="libnetpbm11 is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521535" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521536" version="1" comment="netpbm is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518733" version="1" comment="libnetpbm11 is &lt;10.66.3-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518734" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518735" version="1" comment="netpbm is &lt;10.66.3-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517132" version="1" comment="libblkid1 is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517133" version="1" comment="libblkid1-32bit is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517134" version="1" comment="libmount1 is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517135" version="1" comment="libmount1-32bit is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517136" version="1" comment="libsmartcols1 is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517137" version="1" comment="libuuid-devel is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517138" version="1" comment="libuuid1 is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517139" version="1" comment="libuuid1-32bit is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517140" version="1" comment="python-libmount is &lt;2.25-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517141" version="1" comment="util-linux is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517142" version="1" comment="util-linux-lang is &lt;2.25-40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517143" version="1" comment="util-linux-systemd is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517144" version="1" comment="uuidd is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518450" version="1" comment="libblkid1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518451" version="1" comment="libblkid1-32bit is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518452" version="1" comment="libfdisk1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518453" version="1" comment="libmount1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518454" version="1" comment="libmount1-32bit is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518455" version="1" comment="libsmartcols1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518456" version="1" comment="libuuid-devel is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518457" version="1" comment="libuuid1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518458" version="1" comment="libuuid1-32bit is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518459" version="1" comment="python-libmount is &lt;2.28-44.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518460" version="1" comment="util-linux is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518461" version="1" comment="util-linux-lang is &lt;2.28-44.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518462" version="1" comment="util-linux-systemd is &lt;2.28-44.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518463" version="1" comment="uuidd is &lt;2.28-44.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561998" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561999" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562000" version="1" comment="libdcerpc0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562001" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562002" version="1" comment="libgensec0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562003" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562004" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562005" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562006" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562007" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562008" version="1" comment="libndr-standard0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562009" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562010" version="1" comment="libndr0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562011" version="1" comment="libndr0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562012" version="1" comment="libnetapi0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562013" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562014" version="1" comment="libregistry0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562015" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562016" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562017" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562018" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562019" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562020" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562021" version="1" comment="libsamba-util0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562022" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562023" version="1" comment="libsamdb0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562024" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562025" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562026" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562027" version="1" comment="libsmbclient0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562028" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562029" version="1" comment="libsmbconf0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562030" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562031" version="1" comment="libsmbldap0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562032" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562033" version="1" comment="libtevent-util0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562034" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562035" version="1" comment="libwbclient0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562036" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562037" version="1" comment="samba is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562038" version="1" comment="samba-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562039" version="1" comment="samba-client is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562040" version="1" comment="samba-client-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562041" version="1" comment="samba-doc is &lt;4.2.4-28.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562042" version="1" comment="samba-libs is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562043" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562044" version="1" comment="samba-winbind is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562045" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562046" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562047" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562048" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562049" version="1" comment="libdcerpc0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562050" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562051" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562052" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562053" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562054" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562055" version="1" comment="libndr-standard0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562056" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562057" version="1" comment="libndr0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562058" version="1" comment="libndr0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562059" version="1" comment="libnetapi0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562060" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562061" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562062" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562063" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562064" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562065" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562066" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562067" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562068" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562069" version="1" comment="libsamba-util0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562070" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562071" version="1" comment="libsamdb0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562072" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562073" version="1" comment="libsmbclient0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562074" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562075" version="1" comment="libsmbconf0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562076" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562077" version="1" comment="libsmbldap0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562078" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562079" version="1" comment="libtevent-util0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562080" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562081" version="1" comment="libwbclient0 is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562082" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562083" version="1" comment="samba is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562084" version="1" comment="samba-client is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562085" version="1" comment="samba-client-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562086" version="1" comment="samba-doc is &lt;4.4.2-38.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562087" version="1" comment="samba-libs is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562088" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562089" version="1" comment="samba-winbind is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562090" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517651" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517652" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517908" version="1" comment="libXdmcp6 is &lt;1.1.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517909" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520247" version="1" comment="libXdmcp6 is &lt;1.1.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520248" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170842" version="1" comment="libXdmcp6 is &lt;1.1.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170843" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517896" version="1" comment="libICE6 is &lt;1.0.8-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517897" version="1" comment="libICE6-32bit is &lt;1.0.8-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520249" version="1" comment="libICE6 is &lt;1.0.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520250" version="1" comment="libICE6-32bit is &lt;1.0.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170845" version="1" comment="libICE6 is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170846" version="1" comment="libICE6-32bit is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517233" version="1" comment="kernel-default is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517234" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517235" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517236" version="1" comment="kernel-devel is &lt;3.12.69-60.64.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517237" version="1" comment="kernel-macros is &lt;3.12.69-60.64.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517238" version="1" comment="kernel-source is &lt;3.12.69-60.64.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517239" version="1" comment="kernel-syms is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517240" version="1" comment="kernel-xen is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517241" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518538" version="1" comment="kernel-default is &lt;4.4.49-92.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518539" version="1" comment="kernel-default-devel is &lt;4.4.49-92.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518540" version="1" comment="kernel-default-extra is &lt;4.4.49-92.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518541" version="1" comment="kernel-devel is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518542" version="1" comment="kernel-macros is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518543" version="1" comment="kernel-source is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518544" version="1" comment="kernel-syms is &lt;4.4.49-92.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518037" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518038" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518058" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518059" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518060" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518061" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518062" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518063" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518001" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518002" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518003" version="1" comment="libsoup-lang is &lt;2.54.1-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518004" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519873" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519874" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519875" version="1" comment="libsoup-lang is &lt;2.62.2-5.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519876" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517242" version="1" comment="flash-player is &lt;24.0.0.194-155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517243" version="1" comment="flash-player-gnome is &lt;24.0.0.194-155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517123" version="1" comment="flash-player is &lt;24.0.0.221-158.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517124" version="1" comment="flash-player-gnome is &lt;24.0.0.221-158.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517171" version="1" comment="flash-player is &lt;25.0.0.127-162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517172" version="1" comment="flash-player-gnome is &lt;25.0.0.127-162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517259" version="1" comment="flash-player is &lt;25.0.0.148-165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517260" version="1" comment="flash-player-gnome is &lt;25.0.0.148-165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517335" version="1" comment="flash-player is &lt;25.0.0.171-168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517336" version="1" comment="flash-player-gnome is &lt;25.0.0.171-168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517151" version="1" comment="bind-libs is &lt;9.9.9P1-56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517152" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517153" version="1" comment="bind-utils is &lt;9.9.9P1-56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517668" version="1" comment="bind-libs is &lt;9.9.9P1-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517669" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517670" version="1" comment="bind-utils is &lt;9.9.9P1-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518961" version="1" comment="dhcp is &lt;4.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518962" version="1" comment="dhcp-client is &lt;4.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518819" version="1" comment="bind-libs is &lt;9.9.9P1-63.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518820" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518821" version="1" comment="bind-utils is &lt;9.9.9P1-63.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517447" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517448" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517368" version="1" comment="libmysqlclient18 is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517369" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517370" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517371" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517372" version="1" comment="mariadb is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517373" version="1" comment="mariadb-client is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517374" version="1" comment="mariadb-errormessages is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517951" version="1" comment="libmysqlclient18 is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517952" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517953" version="1" comment="libmysqlclient_r18 is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517954" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517955" version="1" comment="mariadb is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517956" version="1" comment="mariadb-client is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517957" version="1" comment="mariadb-errormessages is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518690" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518691" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519165" version="1" comment="libmysqlclient18 is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519166" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519167" version="1" comment="libmysqlclient_r18 is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519168" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519169" version="1" comment="mariadb is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519170" version="1" comment="mariadb-client is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519171" version="1" comment="mariadb-errormessages is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518373" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518374" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518375" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518376" version="1" comment="openssl is &lt;1.0.2j-60.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518399" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518400" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518401" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518402" version="1" comment="openssl is &lt;1.0.2j-60.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517397" version="1" comment="libplist++1 is &lt;1.8-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517398" version="1" comment="libplist1 is &lt;1.8-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518636" version="1" comment="libplist++3 is &lt;1.12-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518637" version="1" comment="libplist3 is &lt;1.12-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155695" version="1" comment="libplist++3 is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155696" version="1" comment="libplist3 is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162112" version="1" comment="libplist++3 is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162113" version="1" comment="libplist3 is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517091" version="1" comment="libtiff5 is &lt;4.0.7-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517092" version="1" comment="libtiff5-32bit is &lt;4.0.7-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517088" version="1" comment="MozillaFirefox is &lt;45.7.0esr-99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517089" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517173" version="1" comment="MozillaFirefox is &lt;45.8.0esr-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517174" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517322" version="1" comment="libgraphite2-3 is &lt;1.3.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517323" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519535" version="1" comment="xen is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519536" version="1" comment="xen-libs is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519537" version="1" comment="xen-libs-32bit is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334061" version="1" comment="screen is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519174" version="1" comment="kernel-firmware is &lt;20170530-21.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519128" version="1" comment="libvirt is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519129" version="1" comment="libvirt-client is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519130" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519131" version="1" comment="libvirt-daemon is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519132" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519133" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519134" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519135" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519136" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519137" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519138" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519139" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519140" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519141" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519142" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519143" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519144" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519145" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519146" version="1" comment="libvirt-doc is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519175" version="1" comment="ucode-amd is &lt;20170530-21.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519024" version="1" comment="ucode-intel is &lt;20180312-13.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519157" version="1" comment="xen is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519158" version="1" comment="xen-libs is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519159" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519660" version="1" comment="kernel-firmware is &lt;20170530-21.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520603" version="1" comment="libvirt is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520604" version="1" comment="libvirt-admin is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520605" version="1" comment="libvirt-client is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520606" version="1" comment="libvirt-daemon is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520607" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520608" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520609" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520610" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520611" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520612" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520613" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520614" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520615" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520616" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520617" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520618" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520619" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520620" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520621" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520622" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520623" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520624" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520625" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520626" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520627" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520628" version="1" comment="libvirt-doc is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520629" version="1" comment="libvirt-libs is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519661" version="1" comment="ucode-amd is &lt;20170530-21.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520630" version="1" comment="virt-install is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520631" version="1" comment="virt-manager is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520632" version="1" comment="virt-manager-common is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512625" version="1" comment="ucode-intel is &lt;20180807a-13.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521809" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522492" version="1" comment="kernel-default is &lt;4.12.14-95.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522493" version="1" comment="kernel-default-devel is &lt;4.12.14-95.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522494" version="1" comment="kernel-default-extra is &lt;4.12.14-95.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522495" version="1" comment="kernel-devel is &lt;4.12.14-95.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522496" version="1" comment="kernel-macros is &lt;4.12.14-95.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522497" version="1" comment="kernel-source is &lt;4.12.14-95.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522498" version="1" comment="kernel-syms is &lt;4.12.14-95.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517264" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517265" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517266" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.6.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517273" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517274" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.6.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517275" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517267" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517268" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517276" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517277" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517278" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517279" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517280" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517281" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517269" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517270" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517282" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517283" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517284" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517285" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517286" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517287" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517288" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517289" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517290" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517291" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517292" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517293" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517294" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517295" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518572" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518573" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518574" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-17.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518581" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518582" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518583" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518575" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518576" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518584" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518585" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518586" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518587" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518588" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518589" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518577" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518578" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518590" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518591" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518592" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518593" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518594" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518595" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518596" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518597" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518598" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518599" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518600" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518601" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518602" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518603" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517253" version="1" comment="gstreamer is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517254" version="1" comment="gstreamer-lang is &lt;1.2.4-2.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517255" version="1" comment="gstreamer-utils is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517256" version="1" comment="libgstreamer-1_0-0 is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517257" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517258" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518563" version="1" comment="gstreamer is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518564" version="1" comment="gstreamer-lang is &lt;1.8.3-9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518565" version="1" comment="gstreamer-utils is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518566" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518567" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518568" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150843" version="1" comment="gstreamer is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150844" version="1" comment="gstreamer-lang is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150845" version="1" comment="gstreamer-utils is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150846" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150847" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150848" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334063" version="1" comment="gstreamer-plugins-good is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518551" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518552" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518553" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518554" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518555" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518556" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518557" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518558" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518559" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518560" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518561" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518562" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519985" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512380" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518992" version="1" comment="libyaml-cpp0_5 is &lt;0.5.3-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172757" version="1" comment="libyaml-cpp0_5 is &lt;0.5.3-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517664" version="1" comment="gvim is &lt;7.4.326-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517665" version="1" comment="vim is &lt;7.4.326-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517666" version="1" comment="vim-data is &lt;7.4.326-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517114" version="1" comment="kernel-default is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517115" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517116" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517117" version="1" comment="kernel-devel is &lt;3.12.69-60.64.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517118" version="1" comment="kernel-macros is &lt;3.12.69-60.64.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517119" version="1" comment="kernel-source is &lt;3.12.69-60.64.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517120" version="1" comment="kernel-syms is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517121" version="1" comment="kernel-xen is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517122" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517311" version="1" comment="libzzip-0-13 is &lt;0.13.62-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154700" version="1" comment="libzzip-0-13 is &lt;0.13.62-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512571" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517175" version="1" comment="sane-backends is &lt;1.0.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517176" version="1" comment="sane-backends-32bit is &lt;1.0.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517177" version="1" comment="sane-backends-autoconfig is &lt;1.0.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149621" version="1" comment="sane-backends is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149622" version="1" comment="sane-backends-32bit is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149623" version="1" comment="sane-backends-autoconfig is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518754" version="1" comment="gd is &lt;2.1.0-24.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518755" version="1" comment="gd-32bit is &lt;2.1.0-24.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517333" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518026" version="1" comment="libplist++3 is &lt;1.12-20.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518027" version="1" comment="libplist3 is &lt;1.12-20.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518705" version="1" comment="ImageMagick is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518706" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518707" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518708" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518709" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518569" version="1" comment="xen is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518570" version="1" comment="xen-libs is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518571" version="1" comment="xen-libs-32bit is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517324" version="1" comment="apparmor-docs is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517325" version="1" comment="apparmor-parser is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517326" version="1" comment="apparmor-profiles is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517327" version="1" comment="apparmor-utils is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517328" version="1" comment="libapparmor1 is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517329" version="1" comment="libapparmor1-32bit is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517330" version="1" comment="pam_apparmor is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517331" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517332" version="1" comment="perl-apparmor is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158932" version="1" comment="apparmor-docs is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158933" version="1" comment="apparmor-parser is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158934" version="1" comment="apparmor-profiles is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158935" version="1" comment="apparmor-utils is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158936" version="1" comment="libapparmor1 is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158937" version="1" comment="libapparmor1-32bit is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158938" version="1" comment="pam_apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158939" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158940" version="1" comment="perl-apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517180" version="1" comment="wget is &lt;1.14-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338989" version="1" comment="avahi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521619" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338990" version="1" comment="podofo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521215" version="1" comment="libtasn1 is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521216" version="1" comment="libtasn1-6 is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521217" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159629" version="1" comment="drm-kmp-default is &lt;4.9.33_k4.4.73_5-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517672" version="1" comment="libxml2-2 is &lt;2.9.4-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517673" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517674" version="1" comment="libxml2-tools is &lt;2.9.4-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517675" version="1" comment="python-libxml2 is &lt;2.9.4-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517309" version="1" comment="tigervnc is &lt;1.4.3-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517310" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518604" version="1" comment="libXvnc1 is &lt;1.6.0-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518605" version="1" comment="tigervnc is &lt;1.6.0-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518606" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517971" version="1" comment="libzypp is &lt;16.15.2-27.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517972" version="1" comment="zypper is &lt;1.13.30-18.13.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517973" version="1" comment="zypper-log is &lt;1.13.30-18.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519248" version="1" comment="libzypp is &lt;16.15.3-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519249" version="1" comment="yast2-pkg-bindings is &lt;3.2.4-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512570" version="1" comment="libzypp is &lt;16.19.0-2.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519441" version="1" comment="libzypp is &lt;16.15.6-2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519442" version="1" comment="zypper is &lt;1.13.32-21.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519443" version="1" comment="zypper-log is &lt;1.13.32-21.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512642" version="1" comment="zypper is &lt;1.13.45-21.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512643" version="1" comment="zypper-log is &lt;1.13.45-21.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517308" version="1" comment="minicom is &lt;2.7-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154609" version="1" comment="minicom is &lt;2.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334070" version="1" comment="emacs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334071" version="1" comment="lftp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517654" version="1" comment="postgresql94 is &lt;9.4.12-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517399" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517400" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517401" version="1" comment="libdcerpc0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517402" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517403" version="1" comment="libgensec0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517404" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517405" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517406" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517407" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517408" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517409" version="1" comment="libndr-standard0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517410" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517411" version="1" comment="libndr0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517412" version="1" comment="libndr0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517413" version="1" comment="libnetapi0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517414" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517415" version="1" comment="libregistry0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517416" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517417" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517418" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517419" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517420" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517421" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517422" version="1" comment="libsamba-util0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517423" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517424" version="1" comment="libsamdb0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517425" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517426" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517427" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517428" version="1" comment="libsmbclient0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517429" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517430" version="1" comment="libsmbconf0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517431" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517432" version="1" comment="libsmbldap0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517433" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517434" version="1" comment="libtevent-util0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517435" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517436" version="1" comment="libwbclient0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517437" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517438" version="1" comment="samba is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517439" version="1" comment="samba-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517440" version="1" comment="samba-client is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517441" version="1" comment="samba-client-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517442" version="1" comment="samba-doc is &lt;4.2.4-28.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517443" version="1" comment="samba-libs is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517444" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517445" version="1" comment="samba-winbind is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517446" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518682" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518638" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518639" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518640" version="1" comment="libdcerpc0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518641" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518642" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518643" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518644" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518645" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518646" version="1" comment="libndr-standard0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518647" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518648" version="1" comment="libndr0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518649" version="1" comment="libndr0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518650" version="1" comment="libnetapi0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518651" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518652" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518653" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518654" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518655" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518656" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518657" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518658" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518659" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518660" version="1" comment="libsamba-util0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518661" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518662" version="1" comment="libsamdb0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518663" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518664" version="1" comment="libsmbclient0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518665" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518666" version="1" comment="libsmbconf0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518667" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518668" version="1" comment="libsmbldap0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518669" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518670" version="1" comment="libtevent-util0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518671" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518672" version="1" comment="libwbclient0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518673" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518674" version="1" comment="samba is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518675" version="1" comment="samba-client is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518676" version="1" comment="samba-client-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518677" version="1" comment="samba-doc is &lt;4.4.2-38.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518678" version="1" comment="samba-libs is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518679" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518680" version="1" comment="samba-winbind is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518681" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520377" version="1" comment="rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520378" version="1" comment="rpm-32bit is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520379" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520380" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521784" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517898" version="1" comment="libspice-server1 is &lt;0.12.7-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519463" version="1" comment="libspice-server1 is &lt;0.12.8-3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517893" version="1" comment="gnutls is &lt;3.2.15-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517894" version="1" comment="libgnutls28 is &lt;3.2.15-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517895" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517609" version="1" comment="openvpn is &lt;2.3.8-16.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517940" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517941" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517942" version="1" comment="libpoppler60 is &lt;0.43.0-16.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517943" version="1" comment="poppler-tools is &lt;0.43.0-16.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338991" version="1" comment="cpio is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517699" version="1" comment="libgcrypt20 is &lt;1.6.1-16.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517700" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517964" version="1" comment="kernel-default is &lt;4.4.74-92.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517965" version="1" comment="kernel-default-devel is &lt;4.4.74-92.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517966" version="1" comment="kernel-default-extra is &lt;4.4.74-92.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517967" version="1" comment="kernel-devel is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517968" version="1" comment="kernel-macros is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517969" version="1" comment="kernel-source is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517970" version="1" comment="kernel-syms is &lt;4.4.74-92.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518054" version="1" comment="libecpg6 is &lt;9.6.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518055" version="1" comment="libpq5 is &lt;9.6.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518056" version="1" comment="libpq5-32bit is &lt;9.6.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518053" version="1" comment="postgresql94 is &lt;9.4.13-21.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518057" version="1" comment="postgresql96 is &lt;9.6.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518995" version="1" comment="augeas is &lt;1.2.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518996" version="1" comment="augeas-lenses is &lt;1.2.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518997" version="1" comment="libaugeas0 is &lt;1.2.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520526" version="1" comment="augeas is &lt;1.2.0-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520527" version="1" comment="augeas-lenses is &lt;1.2.0-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520528" version="1" comment="libaugeas0 is &lt;1.2.0-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517395" version="1" comment="libsndfile1 is &lt;1.0.25-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517396" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517296" version="1" comment="libsndfile1 is &lt;1.0.25-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517297" version="1" comment="libsndfile1-32bit is &lt;1.0.25-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334073" version="1" comment="elfutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518607" version="1" comment="xen is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518608" version="1" comment="xen-libs is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518609" version="1" comment="xen-libs-32bit is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518136" version="1" comment="MozillaFirefox is &lt;52.3.0esr-109.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518137" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-109.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518187" version="1" comment="MozillaFirefox is &lt;52.4.0esr-109.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518188" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-109.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518189" version="1" comment="libfreebl3 is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518190" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518191" version="1" comment="libsoftokn3 is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518192" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518193" version="1" comment="mozilla-nss is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518194" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518195" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518196" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518197" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518198" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518199" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518381" version="1" comment="MozillaFirefox is &lt;52.5.0esr-109.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518382" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-109.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522663" version="1" comment="gd is &lt;2.1.0-24.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522664" version="1" comment="gd-32bit is &lt;2.1.0-24.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521436" version="1" comment="libcroco-0_6-3 is &lt;0.6.11-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521437" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.11-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521960" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518033" version="1" comment="gnome-shell is &lt;3.20.4-77.7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518034" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518035" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518036" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517676" version="1" comment="xen is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517677" version="1" comment="xen-libs is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517678" version="1" comment="xen-libs-32bit is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517376" version="1" comment="libkde4 is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517377" version="1" comment="libkde4-32bit is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517378" version="1" comment="libkdecore4 is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517379" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517380" version="1" comment="libksuseinstall1 is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517381" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517363" version="1" comment="libtirpc1 is &lt;0.2.3-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517364" version="1" comment="libtirpc1-32bit is &lt;0.2.3-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517375" version="1" comment="rpcbind is &lt;0.2.1_rc4-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518632" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518633" version="1" comment="libtirpc3 is &lt;1.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518634" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518635" version="1" comment="rpcbind is &lt;0.2.3-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155553" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155554" version="1" comment="libtirpc3 is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155555" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512497" version="1" comment="libtirpc-netconfig is &lt;1.0.1-17.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512498" version="1" comment="libtirpc3 is &lt;1.0.1-17.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512499" version="1" comment="libtirpc3-32bit is &lt;1.0.1-17.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519186" version="1" comment="curl is &lt;7.37.0-37.11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519187" version="1" comment="libcurl4 is &lt;7.37.0-37.11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519188" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518017" version="1" comment="libxml2-2 is &lt;2.9.4-46.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518018" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518019" version="1" comment="libxml2-tools is &lt;2.9.4-46.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518020" version="1" comment="python-libxml2 is &lt;2.9.4-46.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518697" version="1" comment="strongswan is &lt;5.1.3-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518698" version="1" comment="strongswan-doc is &lt;5.1.3-25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518699" version="1" comment="strongswan-ipsec is &lt;5.1.3-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518700" version="1" comment="strongswan-libs0 is &lt;5.1.3-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518710" version="1" comment="libxml2-2 is &lt;2.9.4-39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518711" version="1" comment="libxml2-2-32bit is &lt;2.9.4-39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518712" version="1" comment="libxml2-tools is &lt;2.9.4-39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518713" version="1" comment="python-libxml2 is &lt;2.9.4-39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517653" version="1" comment="libpoppler44 is &lt;0.24.4-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522007" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522008" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522009" version="1" comment="openexr is &lt;2.1.0-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334075" version="1" comment="openexr is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517698" version="1" comment="libquicktime0 is &lt;1.2.4-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517688" version="1" comment="libsystemd0 is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517689" version="1" comment="libsystemd0-32bit is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517690" version="1" comment="libudev1 is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517691" version="1" comment="libudev1-32bit is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517692" version="1" comment="systemd is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517693" version="1" comment="systemd-32bit is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517694" version="1" comment="systemd-bash-completion is &lt;228-149.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517695" version="1" comment="systemd-sysvinit is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517696" version="1" comment="udev is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519195" version="1" comment="libsystemd0 is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519196" version="1" comment="libsystemd0-32bit is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519197" version="1" comment="libudev1 is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519198" version="1" comment="libudev1-32bit is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519199" version="1" comment="systemd is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519200" version="1" comment="systemd-32bit is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519201" version="1" comment="systemd-bash-completion is &lt;228-150.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519202" version="1" comment="systemd-sysvinit is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519203" version="1" comment="udev is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520073" version="1" comment="libzypp is &lt;16.17.20-2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520074" version="1" comment="zypper is &lt;1.13.45-21.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520075" version="1" comment="zypper-log is &lt;1.13.45-21.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518714" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518715" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518716" version="1" comment="openldap2-client is &lt;2.4.41-18.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517633" version="1" comment="libwireshark8 is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517634" version="1" comment="libwiretap6 is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517635" version="1" comment="libwscodecs1 is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517636" version="1" comment="libwsutil7 is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517637" version="1" comment="wireshark is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517638" version="1" comment="wireshark-gtk is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517939" version="1" comment="libpoppler44 is &lt;0.24.4-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520680" version="1" comment="boost-license1_54_0 is &lt;1.54.0-26.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520681" version="1" comment="gnome-documents is &lt;3.20.1-10.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520682" version="1" comment="gnome-documents-lang is &lt;3.20.1-10.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520683" version="1" comment="gnome-documents_books-common is &lt;3.20.1-10.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520684" version="1" comment="gnome-shell-search-provider-documents is &lt;3.20.1-10.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520685" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520686" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520687" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520688" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520689" version="1" comment="libboost_locale1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520690" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520691" version="1" comment="libboost_random1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520692" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520693" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520694" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520695" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520696" version="1" comment="libepubgen-0_1-1 is &lt;0.1.0-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520697" version="1" comment="libixion-0_13-0 is &lt;0.13.0-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520698" version="1" comment="libmwaw-0_3-3 is &lt;0.3.13-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520699" version="1" comment="liborcus-0_13-0 is &lt;0.13.4-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520700" version="1" comment="libqxp-0_0-0 is &lt;0.0.1-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520701" version="1" comment="libreoffice is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520702" version="1" comment="libreoffice-base is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520703" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520704" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520705" version="1" comment="libreoffice-branding-upstream is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520706" version="1" comment="libreoffice-calc is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520707" version="1" comment="libreoffice-calc-extensions is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520708" version="1" comment="libreoffice-draw is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520709" version="1" comment="libreoffice-filters-optional is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520710" version="1" comment="libreoffice-gnome is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520711" version="1" comment="libreoffice-gtk2 is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520712" version="1" comment="libreoffice-icon-themes is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520713" version="1" comment="libreoffice-impress is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520714" version="1" comment="libreoffice-l10n-af is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520715" version="1" comment="libreoffice-l10n-ar is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520716" version="1" comment="libreoffice-l10n-ca is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520717" version="1" comment="libreoffice-l10n-cs is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520718" version="1" comment="libreoffice-l10n-da is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520719" version="1" comment="libreoffice-l10n-de is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520720" version="1" comment="libreoffice-l10n-en is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520721" version="1" comment="libreoffice-l10n-es is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520722" version="1" comment="libreoffice-l10n-fi is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520723" version="1" comment="libreoffice-l10n-fr is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520724" version="1" comment="libreoffice-l10n-gu is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520725" version="1" comment="libreoffice-l10n-hi is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520726" version="1" comment="libreoffice-l10n-hu is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520727" version="1" comment="libreoffice-l10n-it is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520728" version="1" comment="libreoffice-l10n-ja is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520729" version="1" comment="libreoffice-l10n-ko is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520730" version="1" comment="libreoffice-l10n-nb is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520731" version="1" comment="libreoffice-l10n-nl is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520732" version="1" comment="libreoffice-l10n-nn is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520733" version="1" comment="libreoffice-l10n-pl is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520734" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520735" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520736" version="1" comment="libreoffice-l10n-ro is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520737" version="1" comment="libreoffice-l10n-ru is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520738" version="1" comment="libreoffice-l10n-sk is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520739" version="1" comment="libreoffice-l10n-sv is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520740" version="1" comment="libreoffice-l10n-xh is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520741" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520742" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520743" version="1" comment="libreoffice-l10n-zu is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520744" version="1" comment="libreoffice-mailmerge is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520745" version="1" comment="libreoffice-math is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520746" version="1" comment="libreoffice-officebean is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520747" version="1" comment="libreoffice-pyuno is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520748" version="1" comment="libreoffice-writer is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520749" version="1" comment="libreoffice-writer-extensions is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520750" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520751" version="1" comment="libwps-0_4-4 is &lt;0.4.7-10.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520752" version="1" comment="myspell-af_NA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520753" version="1" comment="myspell-af_ZA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520754" version="1" comment="myspell-ar is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520755" version="1" comment="myspell-ar_AE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520756" version="1" comment="myspell-ar_BH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520757" version="1" comment="myspell-ar_DZ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520758" version="1" comment="myspell-ar_EG is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520759" version="1" comment="myspell-ar_IQ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520760" version="1" comment="myspell-ar_JO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520761" version="1" comment="myspell-ar_KW is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520762" version="1" comment="myspell-ar_LB is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520763" version="1" comment="myspell-ar_LY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520764" version="1" comment="myspell-ar_MA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520765" version="1" comment="myspell-ar_OM is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520766" version="1" comment="myspell-ar_QA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520767" version="1" comment="myspell-ar_SA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520768" version="1" comment="myspell-ar_SD is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520769" version="1" comment="myspell-ar_SY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520770" version="1" comment="myspell-ar_TN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520771" version="1" comment="myspell-ar_YE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520772" version="1" comment="myspell-be_BY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520773" version="1" comment="myspell-bg_BG is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520774" version="1" comment="myspell-bn_BD is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520775" version="1" comment="myspell-bn_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520776" version="1" comment="myspell-bs is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520777" version="1" comment="myspell-bs_BA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520778" version="1" comment="myspell-ca is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520779" version="1" comment="myspell-ca_AD is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520780" version="1" comment="myspell-ca_ES is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520781" version="1" comment="myspell-ca_ES_valencia is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520782" version="1" comment="myspell-ca_FR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520783" version="1" comment="myspell-ca_IT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520784" version="1" comment="myspell-cs_CZ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520785" version="1" comment="myspell-da_DK is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520786" version="1" comment="myspell-de is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520787" version="1" comment="myspell-de_AT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520788" version="1" comment="myspell-de_CH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520789" version="1" comment="myspell-de_DE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520790" version="1" comment="myspell-dictionaries is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520791" version="1" comment="myspell-el_GR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520792" version="1" comment="myspell-en is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520793" version="1" comment="myspell-en_AU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520794" version="1" comment="myspell-en_BS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520795" version="1" comment="myspell-en_BZ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520796" version="1" comment="myspell-en_CA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520797" version="1" comment="myspell-en_GB is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520798" version="1" comment="myspell-en_GH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520799" version="1" comment="myspell-en_IE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520800" version="1" comment="myspell-en_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520801" version="1" comment="myspell-en_JM is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520802" version="1" comment="myspell-en_MW is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520803" version="1" comment="myspell-en_NA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520804" version="1" comment="myspell-en_NZ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520805" version="1" comment="myspell-en_PH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520806" version="1" comment="myspell-en_TT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520807" version="1" comment="myspell-en_US is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520808" version="1" comment="myspell-en_ZA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520809" version="1" comment="myspell-en_ZW is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520810" version="1" comment="myspell-es is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520811" version="1" comment="myspell-es_AR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520812" version="1" comment="myspell-es_BO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520813" version="1" comment="myspell-es_CL is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520814" version="1" comment="myspell-es_CO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520815" version="1" comment="myspell-es_CR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520816" version="1" comment="myspell-es_CU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520817" version="1" comment="myspell-es_DO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520818" version="1" comment="myspell-es_EC is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520819" version="1" comment="myspell-es_ES is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520820" version="1" comment="myspell-es_GT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520821" version="1" comment="myspell-es_HN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520822" version="1" comment="myspell-es_MX is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520823" version="1" comment="myspell-es_NI is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520824" version="1" comment="myspell-es_PA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520825" version="1" comment="myspell-es_PE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520826" version="1" comment="myspell-es_PR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520827" version="1" comment="myspell-es_PY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520828" version="1" comment="myspell-es_SV is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520829" version="1" comment="myspell-es_UY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520830" version="1" comment="myspell-es_VE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520831" version="1" comment="myspell-et_EE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520832" version="1" comment="myspell-fr_BE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520833" version="1" comment="myspell-fr_CA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520834" version="1" comment="myspell-fr_CH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520835" version="1" comment="myspell-fr_FR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520836" version="1" comment="myspell-fr_LU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520837" version="1" comment="myspell-fr_MC is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520838" version="1" comment="myspell-gu_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520839" version="1" comment="myspell-he_IL is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520840" version="1" comment="myspell-hi_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520841" version="1" comment="myspell-hr_HR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520842" version="1" comment="myspell-hu_HU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520843" version="1" comment="myspell-id is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520844" version="1" comment="myspell-id_ID is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520845" version="1" comment="myspell-it_IT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520846" version="1" comment="myspell-lightproof-en is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520847" version="1" comment="myspell-lightproof-hu_HU is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520848" version="1" comment="myspell-lightproof-pt_BR is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520849" version="1" comment="myspell-lightproof-ru_RU is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520850" version="1" comment="myspell-lo_LA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520851" version="1" comment="myspell-lt_LT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520852" version="1" comment="myspell-lv_LV is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520853" version="1" comment="myspell-nb_NO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520854" version="1" comment="myspell-nl_BE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520855" version="1" comment="myspell-nl_NL is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520856" version="1" comment="myspell-nn_NO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520857" version="1" comment="myspell-no is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520858" version="1" comment="myspell-pl_PL is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520859" version="1" comment="myspell-pt_AO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520860" version="1" comment="myspell-pt_BR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520861" version="1" comment="myspell-pt_PT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520862" version="1" comment="myspell-ro is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520863" version="1" comment="myspell-ro_RO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520864" version="1" comment="myspell-ru_RU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520865" version="1" comment="myspell-sk_SK is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520866" version="1" comment="myspell-sl_SI is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520867" version="1" comment="myspell-sr is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520868" version="1" comment="myspell-sr_CS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520869" version="1" comment="myspell-sr_Latn_CS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520870" version="1" comment="myspell-sr_Latn_RS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520871" version="1" comment="myspell-sr_RS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520872" version="1" comment="myspell-sv_FI is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520873" version="1" comment="myspell-sv_SE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520874" version="1" comment="myspell-te is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520875" version="1" comment="myspell-te_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520876" version="1" comment="myspell-th_TH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520877" version="1" comment="myspell-uk_UA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520878" version="1" comment="myspell-vi is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520879" version="1" comment="myspell-vi_VN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520880" version="1" comment="myspell-zu_ZA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174959" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174905" version="1" comment="libmwaw-0_3-3 is &lt;0.3.13-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517924" version="1" comment="dracut is &lt;044.1-109.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517925" version="1" comment="libsystemd0 is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517926" version="1" comment="libsystemd0-32bit is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517927" version="1" comment="libudev1 is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517928" version="1" comment="libudev1-32bit is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517929" version="1" comment="systemd is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517930" version="1" comment="systemd-32bit is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517931" version="1" comment="systemd-bash-completion is &lt;228-150.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517932" version="1" comment="systemd-sysvinit is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517933" version="1" comment="udev is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518736" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518737" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520892" version="1" comment="libcairo-gobject2 is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520893" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520894" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520895" version="1" comment="libcairo2 is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520896" version="1" comment="libcairo2-32bit is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519953" version="1" comment="clamav is &lt;0.100.1-33.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520989" version="1" comment="wget is &lt;1.14-21.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520455" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520456" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520457" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520458" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519982" version="1" comment="libgcrypt20 is &lt;1.6.1-16.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519983" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520459" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520460" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520461" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520462" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520463" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520464" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520465" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520466" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520467" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520468" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520469" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519760" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520047" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520048" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519761" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519762" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519763" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520373" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520374" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520375" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520376" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521787" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521788" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521789" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521785" version="1" comment="libopenssl1_1 is &lt;1.1.1-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521786" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521790" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520119" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520120" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520121" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520122" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519160" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519161" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519162" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519163" version="1" comment="openssl is &lt;1.0.2j-60.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512612" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521200" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521201" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518782" version="1" comment="curl is &lt;7.37.0-37.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518783" version="1" comment="libcurl4 is &lt;7.37.0-37.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518784" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338997" version="1" comment="unzip is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520906" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.20-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520907" version="1" comment="librsvg-2-2 is &lt;2.40.20-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520908" version="1" comment="librsvg-2-2-32bit is &lt;2.40.20-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520909" version="1" comment="rsvg-view is &lt;2.40.20-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334079" version="1" comment="sharutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519030" version="1" comment="curl is &lt;7.37.0-37.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519031" version="1" comment="libcurl4 is &lt;7.37.0-37.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519032" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520982" version="1" comment="kernel-default is &lt;4.4.131-94.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520983" version="1" comment="kernel-default-devel is &lt;4.4.131-94.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520984" version="1" comment="kernel-default-extra is &lt;4.4.131-94.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520985" version="1" comment="kernel-devel is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520986" version="1" comment="kernel-macros is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520987" version="1" comment="kernel-source is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520988" version="1" comment="kernel-syms is &lt;4.4.131-94.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521165" version="1" comment="kernel-default is &lt;4.4.178-94.91.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521166" version="1" comment="kernel-default-devel is &lt;4.4.178-94.91.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521167" version="1" comment="kernel-default-extra is &lt;4.4.178-94.91.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521168" version="1" comment="kernel-devel is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521169" version="1" comment="kernel-macros is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521170" version="1" comment="kernel-source is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521171" version="1" comment="kernel-syms is &lt;4.4.178-94.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338998" version="1" comment="pkg-config is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520083" version="1" comment="gd is &lt;2.1.0-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520084" version="1" comment="gd-32bit is &lt;2.1.0-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520148" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520149" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520150" version="1" comment="soundtouch is &lt;1.7.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512228" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512229" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512230" version="1" comment="soundtouch is &lt;1.7.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520965" version="1" comment="curl is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520966" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520967" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520299" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520300" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520301" version="1" comment="python is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520302" version="1" comment="python-base is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520303" version="1" comment="python-curses is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520304" version="1" comment="python-devel is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520305" version="1" comment="python-tk is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520306" version="1" comment="python-xml is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522041" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522042" version="1" comment="python3 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522043" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522044" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520401" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520402" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520403" version="1" comment="python-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520404" version="1" comment="python3-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521791" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521792" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521569" version="1" comment="avahi is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521570" version="1" comment="avahi-lang is &lt;0.6.32-32.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521571" version="1" comment="libavahi-client3 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521572" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521573" version="1" comment="libavahi-common3 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521574" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521575" version="1" comment="libavahi-core7 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521576" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521577" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521578" version="1" comment="libavahi-gobject0 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521579" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521580" version="1" comment="libavahi-ui0 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521581" version="1" comment="libdns_sd is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521582" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522248" version="1" comment="binutils is &lt;2.32-9.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334229" version="1" comment="gegl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520910" version="1" comment="libreoffice is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520911" version="1" comment="libreoffice-base is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520912" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520913" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520914" version="1" comment="libreoffice-branding-upstream is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520915" version="1" comment="libreoffice-calc is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520916" version="1" comment="libreoffice-calc-extensions is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520917" version="1" comment="libreoffice-draw is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520918" version="1" comment="libreoffice-filters-optional is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520919" version="1" comment="libreoffice-gnome is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520920" version="1" comment="libreoffice-gtk2 is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520921" version="1" comment="libreoffice-icon-themes is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520922" version="1" comment="libreoffice-impress is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520923" version="1" comment="libreoffice-l10n-af is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520924" version="1" comment="libreoffice-l10n-ar is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520925" version="1" comment="libreoffice-l10n-ca is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520926" version="1" comment="libreoffice-l10n-cs is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520927" version="1" comment="libreoffice-l10n-da is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520928" version="1" comment="libreoffice-l10n-de is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520929" version="1" comment="libreoffice-l10n-en is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520930" version="1" comment="libreoffice-l10n-es is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520931" version="1" comment="libreoffice-l10n-fi is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520932" version="1" comment="libreoffice-l10n-fr is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520933" version="1" comment="libreoffice-l10n-gu is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520934" version="1" comment="libreoffice-l10n-hi is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520935" version="1" comment="libreoffice-l10n-hu is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520936" version="1" comment="libreoffice-l10n-it is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520937" version="1" comment="libreoffice-l10n-ja is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520938" version="1" comment="libreoffice-l10n-ko is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520939" version="1" comment="libreoffice-l10n-nb is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520940" version="1" comment="libreoffice-l10n-nl is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520941" version="1" comment="libreoffice-l10n-nn is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520942" version="1" comment="libreoffice-l10n-pl is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520943" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520944" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520945" version="1" comment="libreoffice-l10n-ro is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520946" version="1" comment="libreoffice-l10n-ru is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520947" version="1" comment="libreoffice-l10n-sk is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520948" version="1" comment="libreoffice-l10n-sv is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520949" version="1" comment="libreoffice-l10n-xh is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520950" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520951" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520952" version="1" comment="libreoffice-l10n-zu is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520953" version="1" comment="libreoffice-mailmerge is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520954" version="1" comment="libreoffice-math is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520955" version="1" comment="libreoffice-officebean is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520956" version="1" comment="libreoffice-pyuno is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520957" version="1" comment="libreoffice-writer is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520958" version="1" comment="libreoffice-writer-extensions is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520968" version="1" comment="ghostscript is &lt;9.15-23.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520969" version="1" comment="ghostscript-x11 is &lt;9.15-23.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520674" version="1" comment="rzsz is &lt;0.12.21~rc-1001.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174874" version="1" comment="rzsz is &lt;0.12.21~rc-1001.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521750" version="1" comment="file is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521751" version="1" comment="file-magic is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521752" version="1" comment="libmagic1 is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521753" version="1" comment="libmagic1-32bit is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519654" version="1" comment="libvorbis0 is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519655" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519656" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519657" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519658" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519659" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520889" version="1" comment="xen is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520890" version="1" comment="xen-libs is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520891" version="1" comment="xen-libs-32bit is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519072" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519073" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519074" version="1" comment="libdcerpc0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519075" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519076" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519077" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519078" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519079" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519080" version="1" comment="libndr-standard0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519081" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519082" version="1" comment="libndr0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519083" version="1" comment="libndr0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519084" version="1" comment="libnetapi0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519085" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519086" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519087" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519088" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519089" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519090" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519091" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519092" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519093" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519094" version="1" comment="libsamba-util0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519095" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519096" version="1" comment="libsamdb0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519097" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519098" version="1" comment="libsmbclient0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519099" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519100" version="1" comment="libsmbconf0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519101" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519102" version="1" comment="libsmbldap0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519103" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519104" version="1" comment="libtevent-util0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519105" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519106" version="1" comment="libwbclient0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519107" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519108" version="1" comment="samba is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519109" version="1" comment="samba-client is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519110" version="1" comment="samba-client-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519111" version="1" comment="samba-doc is &lt;4.4.2-38.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519112" version="1" comment="samba-libs is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519113" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519114" version="1" comment="samba-winbind is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519115" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520529" version="1" comment="libdcerpc-binding0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520530" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520531" version="1" comment="libdcerpc0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520532" version="1" comment="libdcerpc0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520533" version="1" comment="libndr-krb5pac0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520534" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520535" version="1" comment="libndr-nbt0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520536" version="1" comment="libndr-nbt0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520537" version="1" comment="libndr-standard0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520538" version="1" comment="libndr-standard0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520539" version="1" comment="libndr0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520540" version="1" comment="libndr0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520541" version="1" comment="libnetapi0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520542" version="1" comment="libnetapi0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520543" version="1" comment="libsamba-credentials0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520544" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520545" version="1" comment="libsamba-errors0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520546" version="1" comment="libsamba-errors0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520547" version="1" comment="libsamba-hostconfig0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520548" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520549" version="1" comment="libsamba-passdb0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520550" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520551" version="1" comment="libsamba-util0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520552" version="1" comment="libsamba-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520553" version="1" comment="libsamdb0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520554" version="1" comment="libsamdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520555" version="1" comment="libsmbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520556" version="1" comment="libsmbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520557" version="1" comment="libsmbconf0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520558" version="1" comment="libsmbconf0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520559" version="1" comment="libsmbldap0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520560" version="1" comment="libsmbldap0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520561" version="1" comment="libtalloc2 is &lt;2.1.10-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520562" version="1" comment="libtalloc2-32bit is &lt;2.1.10-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520563" version="1" comment="libtevent-util0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520564" version="1" comment="libtevent-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520565" version="1" comment="libtevent0 is &lt;0.9.34-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520566" version="1" comment="libtevent0-32bit is &lt;0.9.34-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520567" version="1" comment="libwbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520568" version="1" comment="libwbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520569" version="1" comment="python-talloc is &lt;2.1.10-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520570" version="1" comment="python-talloc-32bit is &lt;2.1.10-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520571" version="1" comment="samba is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520572" version="1" comment="samba-client is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520573" version="1" comment="samba-client-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520574" version="1" comment="samba-doc is &lt;4.6.13+git.72.2a684235f41-3.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520575" version="1" comment="samba-libs is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520576" version="1" comment="samba-libs-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520577" version="1" comment="samba-winbind is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520578" version="1" comment="samba-winbind-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518954" version="1" comment="libecpg6 is &lt;9.6.7-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518955" version="1" comment="libpq5 is &lt;9.6.7-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518956" version="1" comment="libpq5-32bit is &lt;9.6.7-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519011" version="1" comment="postgresql94 is &lt;9.4.16-21.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518957" version="1" comment="postgresql96 is &lt;9.6.7-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334120" version="1" comment="wavpack is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519667" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519668" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519669" version="1" comment="libdcerpc0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519670" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519671" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519672" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519673" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519674" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519675" version="1" comment="libndr-standard0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519676" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519677" version="1" comment="libndr0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519678" version="1" comment="libndr0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519679" version="1" comment="libnetapi0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519680" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519681" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519682" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519683" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519684" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519685" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519686" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519687" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519688" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519689" version="1" comment="libsamba-util0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519690" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519691" version="1" comment="libsamdb0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519692" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519693" version="1" comment="libsmbclient0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519694" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519695" version="1" comment="libsmbconf0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519696" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519697" version="1" comment="libsmbldap0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519698" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519699" version="1" comment="libtevent-util0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519700" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519701" version="1" comment="libwbclient0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519702" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519703" version="1" comment="samba is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519704" version="1" comment="samba-client is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519705" version="1" comment="samba-client-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519706" version="1" comment="samba-doc is &lt;4.6.14+git.150.1540e575faf-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519707" version="1" comment="samba-libs is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519708" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519709" version="1" comment="samba-winbind is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519710" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519026" version="1" comment="libecpg6 is &lt;9.6.8-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519027" version="1" comment="libpq5 is &lt;9.6.8-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519028" version="1" comment="libpq5-32bit is &lt;9.6.8-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519149" version="1" comment="postgresql94 is &lt;9.4.17-21.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519029" version="1" comment="postgresql96 is &lt;9.6.8-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519986" version="1" comment="libreoffice is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519987" version="1" comment="libreoffice-base is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519988" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519989" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519990" version="1" comment="libreoffice-branding-upstream is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519991" version="1" comment="libreoffice-calc is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519992" version="1" comment="libreoffice-calc-extensions is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519993" version="1" comment="libreoffice-draw is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519994" version="1" comment="libreoffice-filters-optional is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519995" version="1" comment="libreoffice-gnome is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519996" version="1" comment="libreoffice-gtk2 is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519997" version="1" comment="libreoffice-icon-themes is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519998" version="1" comment="libreoffice-impress is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519999" version="1" comment="libreoffice-l10n-af is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520000" version="1" comment="libreoffice-l10n-ar is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520001" version="1" comment="libreoffice-l10n-ca is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520002" version="1" comment="libreoffice-l10n-cs is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520003" version="1" comment="libreoffice-l10n-da is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520004" version="1" comment="libreoffice-l10n-de is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520005" version="1" comment="libreoffice-l10n-en is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520006" version="1" comment="libreoffice-l10n-es is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520007" version="1" comment="libreoffice-l10n-fi is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520008" version="1" comment="libreoffice-l10n-fr is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520009" version="1" comment="libreoffice-l10n-gu is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520010" version="1" comment="libreoffice-l10n-hi is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520011" version="1" comment="libreoffice-l10n-hu is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520012" version="1" comment="libreoffice-l10n-it is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520013" version="1" comment="libreoffice-l10n-ja is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520014" version="1" comment="libreoffice-l10n-ko is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520015" version="1" comment="libreoffice-l10n-nb is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520016" version="1" comment="libreoffice-l10n-nl is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520017" version="1" comment="libreoffice-l10n-nn is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520018" version="1" comment="libreoffice-l10n-pl is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520019" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520020" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520021" version="1" comment="libreoffice-l10n-ro is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520022" version="1" comment="libreoffice-l10n-ru is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520023" version="1" comment="libreoffice-l10n-sk is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520024" version="1" comment="libreoffice-l10n-sv is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520025" version="1" comment="libreoffice-l10n-xh is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520026" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520027" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520028" version="1" comment="libreoffice-l10n-zu is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520029" version="1" comment="libreoffice-mailmerge is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520030" version="1" comment="libreoffice-math is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520031" version="1" comment="libreoffice-officebean is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520032" version="1" comment="libreoffice-pyuno is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520033" version="1" comment="libreoffice-writer is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520034" version="1" comment="libreoffice-writer-extensions is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520049" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520050" version="1" comment="python3 is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520051" version="1" comment="python3-base is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520052" version="1" comment="python3-curses is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522411" version="1" comment="libncurses5 is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522412" version="1" comment="libncurses5-32bit is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522413" version="1" comment="libncurses6 is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522414" version="1" comment="libncurses6-32bit is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522415" version="1" comment="ncurses-devel is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522416" version="1" comment="ncurses-utils is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522417" version="1" comment="tack is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522418" version="1" comment="terminfo is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522419" version="1" comment="terminfo-base is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522423" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522424" version="1" comment="strongswan-doc is &lt;5.1.3-26.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522425" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522426" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520417" version="1" comment="qemu is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520418" version="1" comment="qemu-block-curl is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520419" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520420" version="1" comment="qemu-kvm is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520421" version="1" comment="qemu-seabios is &lt;1.10.2-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520422" version="1" comment="qemu-sgabios is &lt;8-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520423" version="1" comment="qemu-tools is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520424" version="1" comment="qemu-vgabios is &lt;1.10.2-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520425" version="1" comment="qemu-x86 is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521800" version="1" comment="qemu is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521801" version="1" comment="qemu-block-curl is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521802" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521803" version="1" comment="qemu-kvm is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521804" version="1" comment="qemu-seabios is &lt;1.11.0-5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521805" version="1" comment="qemu-sgabios is &lt;8-5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521806" version="1" comment="qemu-tools is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521807" version="1" comment="qemu-vgabios is &lt;1.11.0-5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521808" version="1" comment="qemu-x86 is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521730" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521731" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521732" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521733" version="1" comment="libsss_sudo is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521734" version="1" comment="python-sssd-config is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521735" version="1" comment="sssd is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521736" version="1" comment="sssd-32bit is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521737" version="1" comment="sssd-ad is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521738" version="1" comment="sssd-ipa is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521739" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521740" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521741" version="1" comment="sssd-ldap is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521742" version="1" comment="sssd-proxy is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521743" version="1" comment="sssd-tools is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522466" version="1" comment="libipa_hbac0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522467" version="1" comment="libsss_certmap0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522468" version="1" comment="libsss_idmap0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522469" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522470" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522471" version="1" comment="python-sssd-config is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522472" version="1" comment="sssd is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522473" version="1" comment="sssd-32bit is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522474" version="1" comment="sssd-ad is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522475" version="1" comment="sssd-ipa is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522476" version="1" comment="sssd-krb5 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522477" version="1" comment="sssd-krb5-common is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522478" version="1" comment="sssd-ldap is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522479" version="1" comment="sssd-proxy is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522480" version="1" comment="sssd-tools is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519907" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519908" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519909" version="1" comment="libdcerpc0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519910" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519911" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519912" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519913" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519914" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519915" version="1" comment="libndr-standard0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519916" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519917" version="1" comment="libndr0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519918" version="1" comment="libndr0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519919" version="1" comment="libnetapi0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519920" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519921" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519922" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519923" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519924" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519925" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519926" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519927" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519928" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519929" version="1" comment="libsamba-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519930" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519931" version="1" comment="libsamdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519932" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519933" version="1" comment="libsmbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519934" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519935" version="1" comment="libsmbconf0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519936" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519937" version="1" comment="libsmbldap0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519938" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519939" version="1" comment="libtevent-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519940" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519941" version="1" comment="libwbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519942" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519943" version="1" comment="samba is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519944" version="1" comment="samba-client is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519945" version="1" comment="samba-client-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519946" version="1" comment="samba-doc is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519947" version="1" comment="samba-libs is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519948" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519949" version="1" comment="samba-winbind is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519950" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519976" version="1" comment="perl-Archive-Zip is &lt;1.34-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512593" version="1" comment="perl-Archive-Zip is &lt;1.34-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519863" version="1" comment="ceph-common is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519864" version="1" comment="libcephfs2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519865" version="1" comment="librados2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519866" version="1" comment="libradosstriper1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519867" version="1" comment="librbd1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519868" version="1" comment="librgw2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519869" version="1" comment="python-cephfs is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519870" version="1" comment="python-rados is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519871" version="1" comment="python-rbd is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519872" version="1" comment="python-rgw is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520040" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520041" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520042" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520043" version="1" comment="libspice-controller0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520046" version="1" comment="libspice-server1 is &lt;0.12.8-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520044" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520045" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520056" version="1" comment="kernel-default is &lt;4.4.155-94.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520057" version="1" comment="kernel-default-devel is &lt;4.4.155-94.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520058" version="1" comment="kernel-default-extra is &lt;4.4.155-94.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520059" version="1" comment="kernel-devel is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520060" version="1" comment="kernel-macros is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520061" version="1" comment="kernel-source is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520062" version="1" comment="kernel-syms is &lt;4.4.155-94.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519877" version="1" comment="NetworkManager-vpnc is &lt;1.0.8-8.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519878" version="1" comment="NetworkManager-vpnc-gnome is &lt;1.0.8-8.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519879" version="1" comment="NetworkManager-vpnc-lang is &lt;1.0.8-8.4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520244" version="1" comment="fuse is &lt;2.9.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520245" version="1" comment="libfuse2 is &lt;2.9.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338999" version="1" comment="gnome-bluetooth is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520265" version="1" comment="postgresql96 is &lt;9.6.10-3.22.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521684" version="1" comment="lftp is &lt;4.7.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520194" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520195" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520196" version="1" comment="libdcerpc0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520197" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520198" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520199" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520200" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520201" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520202" version="1" comment="libndr-standard0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520203" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520204" version="1" comment="libndr0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520205" version="1" comment="libndr0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520206" version="1" comment="libnetapi0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520207" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520208" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520209" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520210" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520211" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520212" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520213" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520214" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520215" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520216" version="1" comment="libsamba-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520217" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520218" version="1" comment="libsamdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520219" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520220" version="1" comment="libsmbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520221" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520222" version="1" comment="libsmbconf0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520223" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520224" version="1" comment="libsmbldap0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520225" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520226" version="1" comment="libtevent-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520227" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520228" version="1" comment="libwbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520229" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520230" version="1" comment="samba is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520231" version="1" comment="samba-client is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520232" version="1" comment="samba-client-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520233" version="1" comment="samba-doc is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520234" version="1" comment="samba-libs is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520235" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520236" version="1" comment="samba-winbind is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520237" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520246" version="1" comment="libssh4 is &lt;0.6.3-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334087" version="1" comment="libssh2_org is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521021" version="1" comment="xen is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521022" version="1" comment="xen-libs is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521023" version="1" comment="xen-libs-32bit is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520667" version="1" comment="PackageKit is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520668" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520669" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520670" version="1" comment="PackageKit-gtk3-module is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520671" version="1" comment="PackageKit-lang is &lt;1.1.3-24.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520672" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520673" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334179" version="1" comment="dhcp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519715" version="1" comment="libecpg6 is &lt;9.6.9-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519716" version="1" comment="libpq5 is &lt;9.6.9-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519717" version="1" comment="libpq5-32bit is &lt;9.6.9-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519718" version="1" comment="postgresql96 is &lt;9.6.9-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519852" version="1" comment="libpolkit0 is &lt;0.113-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519853" version="1" comment="libpolkit0-32bit is &lt;0.113-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519854" version="1" comment="polkit is &lt;0.113-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519855" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521660" version="1" comment="kernel-default is &lt;4.4.175-94.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521661" version="1" comment="kernel-default-devel is &lt;4.4.175-94.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521662" version="1" comment="kernel-default-extra is &lt;4.4.175-94.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521663" version="1" comment="kernel-devel is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521664" version="1" comment="kernel-macros is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521665" version="1" comment="kernel-source is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521666" version="1" comment="kernel-syms is &lt;4.4.175-94.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521232" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521233" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521150" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521151" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334090" version="1" comment="libjpeg62-turbo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521630" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521631" version="1" comment="procps is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520113" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520114" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520115" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520116" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520117" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520118" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520070" version="1" comment="liblouis-data is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520071" version="1" comment="liblouis9 is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520072" version="1" comment="python3-louis is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521124" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521125" version="1" comment="libjpeg62 is &lt;62.2.0-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521126" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521127" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521128" version="1" comment="libjpeg8 is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521129" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521130" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339004" version="1" comment="ppp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520453" version="1" comment="libatalk12 is &lt;3.1.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520454" version="1" comment="netatalk is &lt;3.1.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520290" version="1" comment="qemu is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520291" version="1" comment="qemu-block-curl is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520292" version="1" comment="qemu-ipxe is &lt;1.0.0-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520293" version="1" comment="qemu-kvm is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520294" version="1" comment="qemu-seabios is &lt;1.10.2-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520295" version="1" comment="qemu-sgabios is &lt;8-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520296" version="1" comment="qemu-tools is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520297" version="1" comment="qemu-vgabios is &lt;1.10.2-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520298" version="1" comment="qemu-x86 is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519821" version="1" comment="xen is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519822" version="1" comment="xen-libs is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519823" version="1" comment="xen-libs-32bit is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519792" version="1" comment="perl is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519793" version="1" comment="perl-32bit is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519794" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519795" version="1" comment="perl-doc is &lt;5.18.2-12.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519719" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519720" version="1" comment="gpg2-lang is &lt;2.0.24-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520313" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520314" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520315" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520316" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520317" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520318" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521465" version="1" comment="libvirt is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521466" version="1" comment="libvirt-admin is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521467" version="1" comment="libvirt-client is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521468" version="1" comment="libvirt-daemon is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521469" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521470" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521471" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521472" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521473" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521474" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521475" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521476" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521477" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521478" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521479" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521480" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521481" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521482" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521483" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521484" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521485" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521486" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521487" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521488" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521489" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521490" version="1" comment="libvirt-doc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521491" version="1" comment="libvirt-libs is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521156" version="1" comment="qemu is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521157" version="1" comment="qemu-block-curl is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521158" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521159" version="1" comment="qemu-kvm is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521160" version="1" comment="qemu-seabios is &lt;1.10.2-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521161" version="1" comment="qemu-sgabios is &lt;8-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521162" version="1" comment="qemu-tools is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521163" version="1" comment="qemu-vgabios is &lt;1.10.2-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521164" version="1" comment="qemu-x86 is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521192" version="1" comment="ucode-intel is &lt;20190514-13.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521172" version="1" comment="xen is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521173" version="1" comment="xen-libs is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521174" version="1" comment="xen-libs-32bit is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521838" version="1" comment="kernel-default is &lt;4.12.14-95.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521839" version="1" comment="kernel-default-devel is &lt;4.12.14-95.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521840" version="1" comment="kernel-default-extra is &lt;4.12.14-95.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521841" version="1" comment="kernel-devel is &lt;4.12.14-95.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521842" version="1" comment="kernel-macros is &lt;4.12.14-95.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521843" version="1" comment="kernel-source is &lt;4.12.14-95.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521844" version="1" comment="kernel-syms is &lt;4.12.14-95.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521848" version="1" comment="libvirt is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521849" version="1" comment="libvirt-admin is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521850" version="1" comment="libvirt-client is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521851" version="1" comment="libvirt-daemon is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521852" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521853" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521854" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521855" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521856" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521857" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521858" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521859" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521860" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521861" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521862" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521863" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521864" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521865" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521866" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521867" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521868" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521869" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521870" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521871" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521872" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521873" version="1" comment="libvirt-doc is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521874" version="1" comment="libvirt-libs is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521829" version="1" comment="qemu is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521830" version="1" comment="qemu-block-curl is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521831" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521832" version="1" comment="qemu-kvm is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521833" version="1" comment="qemu-seabios is &lt;1.11.0-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521834" version="1" comment="qemu-sgabios is &lt;8-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521835" version="1" comment="qemu-tools is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521836" version="1" comment="qemu-vgabios is &lt;1.11.0-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521837" version="1" comment="qemu-x86 is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521994" version="1" comment="ucode-intel is &lt;20190618-13.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522273" version="1" comment="xen is &lt;4.11.2_02-2.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522274" version="1" comment="xen-libs is &lt;4.11.2_02-2.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522275" version="1" comment="xen-libs-32bit is &lt;4.11.2_02-2.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522489" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334095" version="1" comment="ovmf is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522499" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522354" version="1" comment="kernel-default is &lt;4.12.14-95.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522355" version="1" comment="kernel-default-devel is &lt;4.12.14-95.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522356" version="1" comment="kernel-default-extra is &lt;4.12.14-95.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522357" version="1" comment="kernel-devel is &lt;4.12.14-95.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522358" version="1" comment="kernel-macros is &lt;4.12.14-95.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522359" version="1" comment="kernel-source is &lt;4.12.14-95.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522360" version="1" comment="kernel-syms is &lt;4.12.14-95.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522361" version="1" comment="qemu is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522362" version="1" comment="qemu-block-curl is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522363" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522364" version="1" comment="qemu-kvm is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522365" version="1" comment="qemu-seabios is &lt;1.11.0-5.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522366" version="1" comment="qemu-sgabios is &lt;8-5.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522367" version="1" comment="qemu-tools is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522368" version="1" comment="qemu-vgabios is &lt;1.11.0-5.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522369" version="1" comment="qemu-x86 is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522371" version="1" comment="xen is &lt;4.11.2_04-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522372" version="1" comment="xen-libs is &lt;4.11.2_04-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522373" version="1" comment="xen-libs-32bit is &lt;4.11.2_04-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521998" version="1" comment="kernel-default is &lt;4.12.14-95.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521999" version="1" comment="kernel-default-devel is &lt;4.12.14-95.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522000" version="1" comment="kernel-default-extra is &lt;4.12.14-95.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522001" version="1" comment="kernel-devel is &lt;4.12.14-95.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522002" version="1" comment="kernel-macros is &lt;4.12.14-95.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522003" version="1" comment="kernel-source is &lt;4.12.14-95.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522004" version="1" comment="kernel-syms is &lt;4.12.14-95.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520262" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520263" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519951" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519952" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520350" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520351" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334096" version="1" comment="exempi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339005" version="1" comment="gcc7 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339006" version="1" comment="gcc8 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520382" version="1" comment="libtiff5 is &lt;4.0.9-44.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520383" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334097" version="1" comment="libQtWebKit4 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334098" version="1" comment="libqt5-qtwebkit is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334099" version="1" comment="webkitgtk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519809" version="1" comment="kernel-default is &lt;4.4.140-94.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519810" version="1" comment="kernel-default-devel is &lt;4.4.140-94.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519811" version="1" comment="kernel-default-extra is &lt;4.4.140-94.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519812" version="1" comment="kernel-devel is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519813" version="1" comment="kernel-macros is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519814" version="1" comment="kernel-source is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519815" version="1" comment="kernel-syms is &lt;4.4.140-94.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521642" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521643" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521667" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521668" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334101" version="1" comment="libpng15 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522276" version="1" comment="accountsservice is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522277" version="1" comment="accountsservice-lang is &lt;0.6.42-16.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522278" version="1" comment="libaccountsservice0 is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522279" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339021" version="1" comment="soundtouch is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519984" version="1" comment="libcgroup1 is &lt;0.41.rc1-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520035" version="1" comment="gdm is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520036" version="1" comment="gdm-lang is &lt;3.10.0.1-54.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520037" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520038" version="1" comment="libgdm1 is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520039" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520065" version="1" comment="ImageMagick is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520066" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520067" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520068" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520069" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521119" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520164" version="1" comment="libX11-6 is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520165" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520166" version="1" comment="libX11-data is &lt;1.6.2-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520167" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520168" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520169" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520170" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520171" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520172" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520173" version="1" comment="libxcb-glx0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520174" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520175" version="1" comment="libxcb-present0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520176" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520177" version="1" comment="libxcb-randr0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520178" version="1" comment="libxcb-render0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520179" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520180" version="1" comment="libxcb-shape0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520181" version="1" comment="libxcb-shm0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520182" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520183" version="1" comment="libxcb-sync1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520184" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520185" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520186" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520187" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520188" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520189" version="1" comment="libxcb-xkb1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520190" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520191" version="1" comment="libxcb-xv0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520192" version="1" comment="libxcb1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520193" version="1" comment="libxcb1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520130" version="1" comment="kernel-default is &lt;4.4.156-94.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520131" version="1" comment="kernel-default-devel is &lt;4.4.156-94.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520132" version="1" comment="kernel-default-extra is &lt;4.4.156-94.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520133" version="1" comment="kernel-devel is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520134" version="1" comment="kernel-macros is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520135" version="1" comment="kernel-source is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520136" version="1" comment="kernel-syms is &lt;4.4.156-94.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520053" version="1" comment="curl is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520054" version="1" comment="libcurl4 is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520055" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334360" version="1" comment="libtirpc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520343" version="1" comment="kernel-default is &lt;4.4.162-94.69.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520344" version="1" comment="kernel-default-devel is &lt;4.4.162-94.69.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520345" version="1" comment="kernel-default-extra is &lt;4.4.162-94.69.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520346" version="1" comment="kernel-devel is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520347" version="1" comment="kernel-macros is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520348" version="1" comment="kernel-source is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520349" version="1" comment="kernel-syms is &lt;4.4.162-94.69.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521634" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521635" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521636" version="1" comment="python is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521637" version="1" comment="python-base is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521638" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521639" version="1" comment="python-devel is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521640" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521641" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521644" version="1" comment="ceph-common is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521645" version="1" comment="libcephfs2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521646" version="1" comment="librados2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521647" version="1" comment="libradosstriper1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521648" version="1" comment="librbd1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521649" version="1" comment="librgw2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521650" version="1" comment="python-cephfs is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521651" version="1" comment="python-rados is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521652" version="1" comment="python-rbd is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521653" version="1" comment="python-rgw is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334106" version="1" comment="xorg-x11-server is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520273" version="1" comment="clamav is &lt;0.100.2-33.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334107" version="1" comment="btrfsmaintenance is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512564" version="1" comment="libykcs11-1 is &lt;1.5.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512565" version="1" comment="libykpiv1 is &lt;1.5.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512566" version="1" comment="yubico-piv-tool is &lt;1.5.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334108" version="1" comment="pango is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520284" version="1" comment="xen is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520285" version="1" comment="xen-libs is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520286" version="1" comment="xen-libs-32bit is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520384" version="1" comment="openssh is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520385" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520386" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520430" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520431" version="1" comment="libQt5Core5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520432" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520433" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520434" version="1" comment="libQt5Network5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520435" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520436" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520437" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520438" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520439" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520440" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520441" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520442" version="1" comment="libQt5Test5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520443" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520444" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521230" version="1" comment="evolution is &lt;3.22.6-19.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521231" version="1" comment="evolution-lang is &lt;3.22.6-19.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520352" version="1" comment="libsystemd0 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520353" version="1" comment="libsystemd0-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520354" version="1" comment="libudev1 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520355" version="1" comment="libudev1-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520356" version="1" comment="systemd is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520357" version="1" comment="systemd-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520358" version="1" comment="systemd-bash-completion is &lt;228-150.53.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520359" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520360" version="1" comment="udev is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520124" version="1" comment="ghostscript is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520125" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522250" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522251" version="1" comment="libpcap1-32bit is &lt;1.8.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522252" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520341" version="1" comment="opensc is &lt;0.13.0-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521033" version="1" comment="ImageMagick is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521034" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521035" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521036" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521037" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521038" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521039" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334110" version="1" comment="opensc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521548" version="1" comment="glib2-lang is &lt;2.48.2-12.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521549" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521550" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521551" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521552" version="1" comment="libgio-fam is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521553" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521554" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521555" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521556" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521557" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521558" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521559" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521560" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522432" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520126" version="1" comment="g3utils is &lt;1.1.36-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520127" version="1" comment="mgetty is &lt;1.1.36-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512135" version="1" comment="g3utils is &lt;1.1.36-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512136" version="1" comment="mgetty is &lt;1.1.36-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521438" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521439" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521440" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521441" version="1" comment="libsss_sudo is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521442" version="1" comment="python-sssd-config is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521443" version="1" comment="sssd is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521444" version="1" comment="sssd-ad is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521445" version="1" comment="sssd-ipa is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521446" version="1" comment="sssd-krb5 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521447" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521448" version="1" comment="sssd-ldap is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521449" version="1" comment="sssd-proxy is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521450" version="1" comment="sssd-tools is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521875" version="1" comment="libipa_hbac0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521876" version="1" comment="libsss_certmap0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521877" version="1" comment="libsss_idmap0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521878" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521879" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521880" version="1" comment="python-sssd-config is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521881" version="1" comment="sssd is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521882" version="1" comment="sssd-32bit is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521883" version="1" comment="sssd-ad is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521884" version="1" comment="sssd-ipa is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521885" version="1" comment="sssd-krb5 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521886" version="1" comment="sssd-krb5-common is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521887" version="1" comment="sssd-ldap is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521888" version="1" comment="sssd-proxy is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521889" version="1" comment="sssd-tools is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521781" version="1" comment="curl is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521782" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521783" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522450" version="1" comment="curl is &lt;7.60.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522451" version="1" comment="libcurl4 is &lt;7.60.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522452" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520335" version="1" comment="curl is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520336" version="1" comment="libcurl4 is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520337" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520361" version="1" comment="libecpg6 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520362" version="1" comment="libpq5 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520363" version="1" comment="libpq5-32bit is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520364" version="1" comment="postgresql10 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521247" version="1" comment="libixion-0_14-0 is &lt;0.14.1-13.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521248" version="1" comment="liborcus-0_14-0 is &lt;0.14.1-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521249" version="1" comment="libreoffice is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521250" version="1" comment="libreoffice-base is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521251" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521252" version="1" comment="libreoffice-branding-upstream is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521253" version="1" comment="libreoffice-calc is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521254" version="1" comment="libreoffice-calc-extensions is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521255" version="1" comment="libreoffice-draw is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521256" version="1" comment="libreoffice-filters-optional is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521257" version="1" comment="libreoffice-gnome is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521258" version="1" comment="libreoffice-gtk2 is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521259" version="1" comment="libreoffice-icon-themes is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521260" version="1" comment="libreoffice-impress is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521261" version="1" comment="libreoffice-l10n-af is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521262" version="1" comment="libreoffice-l10n-ar is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521263" version="1" comment="libreoffice-l10n-ca is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521264" version="1" comment="libreoffice-l10n-cs is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521265" version="1" comment="libreoffice-l10n-da is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521266" version="1" comment="libreoffice-l10n-de is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521267" version="1" comment="libreoffice-l10n-en is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521268" version="1" comment="libreoffice-l10n-es is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521269" version="1" comment="libreoffice-l10n-fi is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521270" version="1" comment="libreoffice-l10n-fr is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521271" version="1" comment="libreoffice-l10n-gu is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521272" version="1" comment="libreoffice-l10n-hi is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521273" version="1" comment="libreoffice-l10n-hu is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521274" version="1" comment="libreoffice-l10n-it is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521275" version="1" comment="libreoffice-l10n-ja is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521276" version="1" comment="libreoffice-l10n-ko is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521277" version="1" comment="libreoffice-l10n-nb is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521278" version="1" comment="libreoffice-l10n-nl is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521279" version="1" comment="libreoffice-l10n-nn is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521280" version="1" comment="libreoffice-l10n-pl is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521281" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521282" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521283" version="1" comment="libreoffice-l10n-ro is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521284" version="1" comment="libreoffice-l10n-ru is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521285" version="1" comment="libreoffice-l10n-sk is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521286" version="1" comment="libreoffice-l10n-sv is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521287" version="1" comment="libreoffice-l10n-xh is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521288" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521289" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521290" version="1" comment="libreoffice-l10n-zu is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521291" version="1" comment="libreoffice-mailmerge is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521292" version="1" comment="libreoffice-math is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521293" version="1" comment="libreoffice-officebean is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521294" version="1" comment="libreoffice-pyuno is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521295" version="1" comment="libreoffice-writer is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521296" version="1" comment="libreoffice-writer-extensions is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521297" version="1" comment="libwps-0_4-4 is &lt;0.4.10-10.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521298" version="1" comment="myspell-af_NA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521299" version="1" comment="myspell-af_ZA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521300" version="1" comment="myspell-ar is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521301" version="1" comment="myspell-ar_AE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521302" version="1" comment="myspell-ar_BH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521303" version="1" comment="myspell-ar_DZ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521304" version="1" comment="myspell-ar_EG is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521305" version="1" comment="myspell-ar_IQ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521306" version="1" comment="myspell-ar_JO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521307" version="1" comment="myspell-ar_KW is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521308" version="1" comment="myspell-ar_LB is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521309" version="1" comment="myspell-ar_LY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521310" version="1" comment="myspell-ar_MA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521311" version="1" comment="myspell-ar_OM is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521312" version="1" comment="myspell-ar_QA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521313" version="1" comment="myspell-ar_SA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521314" version="1" comment="myspell-ar_SD is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521315" version="1" comment="myspell-ar_SY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521316" version="1" comment="myspell-ar_TN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521317" version="1" comment="myspell-ar_YE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521318" version="1" comment="myspell-be_BY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521319" version="1" comment="myspell-bg_BG is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521320" version="1" comment="myspell-bn_BD is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521321" version="1" comment="myspell-bn_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521322" version="1" comment="myspell-bs is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521323" version="1" comment="myspell-bs_BA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521324" version="1" comment="myspell-ca is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521325" version="1" comment="myspell-ca_AD is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521326" version="1" comment="myspell-ca_ES is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521327" version="1" comment="myspell-ca_ES_valencia is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521328" version="1" comment="myspell-ca_FR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521329" version="1" comment="myspell-ca_IT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521330" version="1" comment="myspell-cs_CZ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521331" version="1" comment="myspell-da_DK is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521332" version="1" comment="myspell-de is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521333" version="1" comment="myspell-de_AT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521334" version="1" comment="myspell-de_CH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521335" version="1" comment="myspell-de_DE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521336" version="1" comment="myspell-dictionaries is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521337" version="1" comment="myspell-el_GR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521338" version="1" comment="myspell-en is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521339" version="1" comment="myspell-en_AU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521340" version="1" comment="myspell-en_BS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521341" version="1" comment="myspell-en_BZ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521342" version="1" comment="myspell-en_CA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521343" version="1" comment="myspell-en_GB is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521344" version="1" comment="myspell-en_GH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521345" version="1" comment="myspell-en_IE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521346" version="1" comment="myspell-en_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521347" version="1" comment="myspell-en_JM is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521348" version="1" comment="myspell-en_MW is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521349" version="1" comment="myspell-en_NA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521350" version="1" comment="myspell-en_NZ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521351" version="1" comment="myspell-en_PH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521352" version="1" comment="myspell-en_TT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521353" version="1" comment="myspell-en_US is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521354" version="1" comment="myspell-en_ZA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521355" version="1" comment="myspell-en_ZW is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521356" version="1" comment="myspell-es is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521357" version="1" comment="myspell-es_AR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521358" version="1" comment="myspell-es_BO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521359" version="1" comment="myspell-es_CL is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521360" version="1" comment="myspell-es_CO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521361" version="1" comment="myspell-es_CR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521362" version="1" comment="myspell-es_CU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521363" version="1" comment="myspell-es_DO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521364" version="1" comment="myspell-es_EC is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521365" version="1" comment="myspell-es_ES is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521366" version="1" comment="myspell-es_GT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521367" version="1" comment="myspell-es_HN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521368" version="1" comment="myspell-es_MX is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521369" version="1" comment="myspell-es_NI is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521370" version="1" comment="myspell-es_PA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521371" version="1" comment="myspell-es_PE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521372" version="1" comment="myspell-es_PR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521373" version="1" comment="myspell-es_PY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521374" version="1" comment="myspell-es_SV is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521375" version="1" comment="myspell-es_UY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521376" version="1" comment="myspell-es_VE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521377" version="1" comment="myspell-et_EE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521378" version="1" comment="myspell-fr_BE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521379" version="1" comment="myspell-fr_CA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521380" version="1" comment="myspell-fr_CH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521381" version="1" comment="myspell-fr_FR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521382" version="1" comment="myspell-fr_LU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521383" version="1" comment="myspell-fr_MC is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521384" version="1" comment="myspell-gu_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521385" version="1" comment="myspell-he_IL is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521386" version="1" comment="myspell-hi_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521387" version="1" comment="myspell-hr_HR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521388" version="1" comment="myspell-hu_HU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521389" version="1" comment="myspell-id is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521390" version="1" comment="myspell-id_ID is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521391" version="1" comment="myspell-it_IT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521392" version="1" comment="myspell-lightproof-en is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521393" version="1" comment="myspell-lightproof-hu_HU is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521394" version="1" comment="myspell-lightproof-pt_BR is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521395" version="1" comment="myspell-lightproof-ru_RU is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521396" version="1" comment="myspell-lo_LA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521397" version="1" comment="myspell-lt_LT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521398" version="1" comment="myspell-lv_LV is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521399" version="1" comment="myspell-nb_NO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521400" version="1" comment="myspell-nl_BE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521401" version="1" comment="myspell-nl_NL is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521402" version="1" comment="myspell-nn_NO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521403" version="1" comment="myspell-no is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521404" version="1" comment="myspell-pl_PL is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521405" version="1" comment="myspell-pt_AO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521406" version="1" comment="myspell-pt_BR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521407" version="1" comment="myspell-pt_PT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521408" version="1" comment="myspell-ro is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521409" version="1" comment="myspell-ro_RO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521410" version="1" comment="myspell-ru_RU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521411" version="1" comment="myspell-sk_SK is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521412" version="1" comment="myspell-sl_SI is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521413" version="1" comment="myspell-sr is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521414" version="1" comment="myspell-sr_CS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521415" version="1" comment="myspell-sr_Latn_CS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521416" version="1" comment="myspell-sr_Latn_RS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521417" version="1" comment="myspell-sr_RS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521418" version="1" comment="myspell-sv_FI is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521419" version="1" comment="myspell-sv_SE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521420" version="1" comment="myspell-te is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521421" version="1" comment="myspell-te_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521422" version="1" comment="myspell-th_TH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521423" version="1" comment="myspell-uk_UA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521424" version="1" comment="myspell-vi is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521425" version="1" comment="myspell-vi_VN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521426" version="1" comment="myspell-zu_ZA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521202" version="1" comment="libsystemd0 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521203" version="1" comment="libsystemd0-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521204" version="1" comment="libudev1 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521205" version="1" comment="libudev1-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521206" version="1" comment="systemd is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521207" version="1" comment="systemd-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521208" version="1" comment="systemd-bash-completion is &lt;228-150.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521209" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521210" version="1" comment="udev is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521967" version="1" comment="kernel-default is &lt;4.12.14-95.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521968" version="1" comment="kernel-default-devel is &lt;4.12.14-95.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521969" version="1" comment="kernel-default-extra is &lt;4.12.14-95.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521970" version="1" comment="kernel-devel is &lt;4.12.14-95.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521971" version="1" comment="kernel-macros is &lt;4.12.14-95.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521972" version="1" comment="kernel-source is &lt;4.12.14-95.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521973" version="1" comment="kernel-syms is &lt;4.12.14-95.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522455" version="1" comment="qemu is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522456" version="1" comment="qemu-block-curl is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522457" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522458" version="1" comment="qemu-kvm is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522459" version="1" comment="qemu-seabios is &lt;1.11.0-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522460" version="1" comment="qemu-sgabios is &lt;8-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522461" version="1" comment="qemu-tools is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522462" version="1" comment="qemu-vgabios is &lt;1.11.0-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522463" version="1" comment="qemu-x86 is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521595" version="1" comment="rsyslog is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522131" version="1" comment="ceph-common is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522132" version="1" comment="libcephfs2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522133" version="1" comment="librados2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522134" version="1" comment="libradosstriper1 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522135" version="1" comment="librbd1 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522136" version="1" comment="librgw2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522137" version="1" comment="python-cephfs is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522138" version="1" comment="python-rados is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522139" version="1" comment="python-rbd is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522140" version="1" comment="python-rgw is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521601" version="1" comment="curl is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521602" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521603" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520307" version="1" comment="audiofile is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520308" version="1" comment="libaudiofile1 is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520309" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520338" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520339" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520340" version="1" comment="soundtouch is &lt;1.7.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521774" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521775" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521776" version="1" comment="soundtouch is &lt;1.7.1-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520410" version="1" comment="ghostscript is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520411" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520412" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334111" version="1" comment="udisks2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520140" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512343" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520264" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522384" version="1" comment="xen is &lt;4.11.1_02-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522385" version="1" comment="xen-libs is &lt;4.11.1_02-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522386" version="1" comment="xen-libs-32bit is &lt;4.11.1_02-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521458" version="1" comment="kernel-default is &lt;4.4.180-94.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521459" version="1" comment="kernel-default-devel is &lt;4.4.180-94.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521460" version="1" comment="kernel-default-extra is &lt;4.4.180-94.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521461" version="1" comment="kernel-devel is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521462" version="1" comment="kernel-macros is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521463" version="1" comment="kernel-source is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521464" version="1" comment="kernel-syms is &lt;4.4.180-94.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339025" version="1" comment="qpdf is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520274" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520275" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520276" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520277" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520278" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334320" version="1" comment="net-snmp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522096" version="1" comment="perl is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522097" version="1" comment="perl-32bit is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522098" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522099" version="1" comment="perl-doc is &lt;5.18.2-12.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521754" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521755" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521605" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521606" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521607" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521608" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521609" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521610" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521611" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521612" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521613" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521614" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521615" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521616" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521617" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521618" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520396" version="1" comment="ImageMagick is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520397" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520398" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520399" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520400" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520407" version="1" comment="xen is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520408" version="1" comment="xen-libs is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520409" version="1" comment="xen-libs-32bit is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520365" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520387" version="1" comment="libncurses5 is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520388" version="1" comment="libncurses5-32bit is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520389" version="1" comment="libncurses6 is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520390" version="1" comment="libncurses6-32bit is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520391" version="1" comment="ncurses-devel is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520392" version="1" comment="ncurses-utils is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520393" version="1" comment="tack is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520394" version="1" comment="terminfo is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520395" version="1" comment="terminfo-base is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521196" version="1" comment="sysstat is &lt;12.0.2-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520426" version="1" comment="tcpdump is &lt;4.9.2-14.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520519" version="1" comment="libwireshark9 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520520" version="1" comment="libwiretap7 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520521" version="1" comment="libwscodecs1 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520522" version="1" comment="libwsutil8 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520523" version="1" comment="wireshark is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520524" version="1" comment="wireshark-gtk is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521131" version="1" comment="supportutils is &lt;3.0-95.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521761" version="1" comment="xen is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521762" version="1" comment="xen-libs is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521763" version="1" comment="xen-libs-32bit is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521590" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521591" version="1" comment="libpolkit0-32bit is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521592" version="1" comment="polkit is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521593" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522604" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522605" version="1" comment="libQt5Core5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522606" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522607" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522608" version="1" comment="libQt5Network5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522609" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522610" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522611" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522612" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522613" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522614" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522615" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522616" version="1" comment="libQt5Test5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522617" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522618" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334276" version="1" comment="cairo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522649" version="1" comment="libexif12 is &lt;0.6.21-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522650" version="1" comment="libexif12-32bit is &lt;0.6.21-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521121" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521122" version="1" comment="krb5-32bit is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521123" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521934" version="1" comment="libu2f-host0 is &lt;1.1.6-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521935" version="1" comment="pam_u2f is &lt;1.0.8-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521758" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521759" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521760" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521184" version="1" comment="libraw9 is &lt;0.15.4-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521597" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521598" version="1" comment="python3 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521599" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521600" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334123" version="1" comment="wget is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334124" version="1" comment="libsolv is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522100" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522101" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522102" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522103" version="1" comment="zypper is &lt;1.13.54-18.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522104" version="1" comment="zypper-log is &lt;1.13.54-18.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522263" version="1" comment="libcaca0 is &lt;0.99.beta18-14.3.27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521193" version="1" comment="openssh is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521194" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521195" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334305" version="1" comment="vim is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521765" version="1" comment="qemu is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521766" version="1" comment="qemu-block-curl is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521767" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521768" version="1" comment="qemu-kvm is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521769" version="1" comment="qemu-seabios is &lt;1.10.2-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521770" version="1" comment="qemu-sgabios is &lt;8-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521771" version="1" comment="qemu-tools is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521772" version="1" comment="qemu-vgabios is &lt;1.10.2-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521773" version="1" comment="qemu-x86 is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521845" version="1" comment="xen is &lt;4.11.1_06-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521846" version="1" comment="xen-libs is &lt;4.11.1_06-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521847" version="1" comment="xen-libs-32bit is &lt;4.11.1_06-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521583" version="1" comment="kernel-default is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521584" version="1" comment="kernel-default-devel is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521585" version="1" comment="kernel-default-extra is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521586" version="1" comment="kernel-devel is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521587" version="1" comment="kernel-macros is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521588" version="1" comment="kernel-source is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521589" version="1" comment="kernel-syms is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521956" version="1" comment="expat is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521957" version="1" comment="libexpat1 is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521958" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522067" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522068" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522289" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522069" version="1" comment="python is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522070" version="1" comment="python-base is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522071" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522072" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522073" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522074" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522290" version="1" comment="python3 is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522291" version="1" comment="python3-base is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522292" version="1" comment="python3-curses is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522045" version="1" comment="kernel-default is &lt;4.12.14-95.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522046" version="1" comment="kernel-default-devel is &lt;4.12.14-95.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522047" version="1" comment="kernel-default-extra is &lt;4.12.14-95.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522048" version="1" comment="kernel-devel is &lt;4.12.14-95.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522049" version="1" comment="kernel-macros is &lt;4.12.14-95.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522050" version="1" comment="kernel-source is &lt;4.12.14-95.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522051" version="1" comment="kernel-syms is &lt;4.12.14-95.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333929" version="1" comment="patch is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519017" version="1" comment="libmysqlclient18 is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519018" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519019" version="1" comment="libmysqlclient_r18 is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519020" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519021" version="1" comment="mariadb is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519022" version="1" comment="mariadb-client is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519023" version="1" comment="mariadb-errormessages is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519007" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.171-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519008" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.171-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519009" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.161-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519010" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.161-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519740" version="1" comment="libmysqlclient18 is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519741" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519742" version="1" comment="libmysqlclient_r18 is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519743" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519744" version="1" comment="mariadb is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519745" version="1" comment="mariadb-client is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519746" version="1" comment="mariadb-errormessages is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519713" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519714" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519711" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519712" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334125" version="1" comment="java-1_7_0-openjdk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333949" version="1" comment="java-1_8_0-openjdk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520141" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520142" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519880" version="1" comment="libvirt is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519881" version="1" comment="libvirt-admin is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519882" version="1" comment="libvirt-client is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519883" version="1" comment="libvirt-daemon is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519884" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519885" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519886" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519887" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519888" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519889" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519890" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519891" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519892" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519893" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519894" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519895" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519896" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519897" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519898" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519899" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519900" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519901" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519902" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519903" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519904" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519905" version="1" comment="libvirt-doc is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519906" version="1" comment="libvirt-libs is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519961" version="1" comment="ucode-intel is &lt;20180807-13.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522033" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.231-43.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522034" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.231-43.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521678" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521679" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521680" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.4-2.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521681" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521682" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521683" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521430" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521431" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521432" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.5-2.32.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521433" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521434" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521435" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520413" version="1" comment="cups is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520414" version="1" comment="cups-client is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520415" version="1" comment="cups-libs is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520416" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518840" version="1" comment="MozillaFirefox is &lt;52.6.0esr-109.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518841" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-109.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519119" version="1" comment="MozillaFirefox is &lt;52.7.3esr-109.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519120" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-109.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519033" version="1" comment="libvorbis0 is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519034" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519035" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519036" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519037" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519038" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520970" version="1" comment="MozillaFirefox is &lt;52.8.0esr-109.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520971" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-109.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521632" version="1" comment="kernel-firmware is &lt;20170530-21.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521633" version="1" comment="ucode-amd is &lt;20170530-21.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518799" version="1" comment="gd is &lt;2.1.0-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518800" version="1" comment="gd-32bit is &lt;2.1.0-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519116" version="1" comment="krb5 is &lt;1.12.5-40.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519117" version="1" comment="krb5-32bit is &lt;1.12.5-40.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519118" version="1" comment="krb5-client is &lt;1.12.5-40.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519047" version="1" comment="dhcp is &lt;4.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519048" version="1" comment="dhcp-client is &lt;4.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521234" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521235" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522222" version="1" comment="bind-utils is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522223" version="1" comment="libbind9-160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522224" version="1" comment="libdns169 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522225" version="1" comment="libirs160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522226" version="1" comment="libisc166 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522227" version="1" comment="libisc166-32bit is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522228" version="1" comment="libisccc160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522229" version="1" comment="libisccfg160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522230" version="1" comment="liblwres160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522231" version="1" comment="python-bind is &lt;9.11.2-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518858" version="1" comment="libvirt is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518859" version="1" comment="libvirt-client is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518860" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518861" version="1" comment="libvirt-daemon is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518862" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518863" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518864" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518865" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518866" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518867" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518868" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518869" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518870" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518871" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518872" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518873" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518874" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518875" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518876" version="1" comment="libvirt-doc is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520086" version="1" comment="libvirt is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520087" version="1" comment="libvirt-admin is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520088" version="1" comment="libvirt-client is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520089" version="1" comment="libvirt-daemon is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520090" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520091" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520092" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520093" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520094" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520095" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520096" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520097" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520098" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520099" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520100" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520101" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520102" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520103" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520104" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520105" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520106" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520107" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520108" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520109" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520110" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520111" version="1" comment="libvirt-doc is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520112" version="1" comment="libvirt-libs is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518763" version="1" comment="rsync is &lt;3.1.0-13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520261" version="1" comment="libraw9 is &lt;0.15.4-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521594" version="1" comment="libraw9 is &lt;0.15.4-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520137" version="1" comment="libtasn1 is &lt;4.9-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520138" version="1" comment="libtasn1-6 is &lt;4.9-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520139" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519747" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519748" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-109.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521701" version="1" comment="w3m is &lt;0.5.3.git20161120-161.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518972" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519645" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518893" version="1" comment="libreoffice is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518894" version="1" comment="libreoffice-base is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518895" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518896" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518897" version="1" comment="libreoffice-calc is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518898" version="1" comment="libreoffice-calc-extensions is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518899" version="1" comment="libreoffice-draw is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518900" version="1" comment="libreoffice-filters-optional is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518901" version="1" comment="libreoffice-gnome is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518902" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518903" version="1" comment="libreoffice-icon-theme-tango is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518904" version="1" comment="libreoffice-impress is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518905" version="1" comment="libreoffice-l10n-af is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518906" version="1" comment="libreoffice-l10n-ar is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518907" version="1" comment="libreoffice-l10n-ca is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518908" version="1" comment="libreoffice-l10n-cs is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518909" version="1" comment="libreoffice-l10n-da is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518910" version="1" comment="libreoffice-l10n-de is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518911" version="1" comment="libreoffice-l10n-en is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518912" version="1" comment="libreoffice-l10n-es is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518913" version="1" comment="libreoffice-l10n-fi is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518914" version="1" comment="libreoffice-l10n-fr is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518915" version="1" comment="libreoffice-l10n-gu is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518916" version="1" comment="libreoffice-l10n-hi is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518917" version="1" comment="libreoffice-l10n-hu is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518918" version="1" comment="libreoffice-l10n-it is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518919" version="1" comment="libreoffice-l10n-ja is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518920" version="1" comment="libreoffice-l10n-ko is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518921" version="1" comment="libreoffice-l10n-nb is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518922" version="1" comment="libreoffice-l10n-nl is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518923" version="1" comment="libreoffice-l10n-nn is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518924" version="1" comment="libreoffice-l10n-pl is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518925" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518926" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518927" version="1" comment="libreoffice-l10n-ro is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518928" version="1" comment="libreoffice-l10n-ru is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518929" version="1" comment="libreoffice-l10n-sk is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518930" version="1" comment="libreoffice-l10n-sv is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518931" version="1" comment="libreoffice-l10n-xh is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518932" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518933" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518934" version="1" comment="libreoffice-l10n-zu is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518935" version="1" comment="libreoffice-mailmerge is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518936" version="1" comment="libreoffice-math is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518937" version="1" comment="libreoffice-officebean is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518938" version="1" comment="libreoffice-pyuno is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518939" version="1" comment="libreoffice-writer is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518940" version="1" comment="libreoffice-writer-extensions is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518941" version="1" comment="libreofficekit is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520479" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520480" version="1" comment="libreoffice-icon-theme-tango is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520518" version="1" comment="libreofficekit is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521175" version="1" comment="libsystemd0 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521176" version="1" comment="libsystemd0-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521177" version="1" comment="libudev1 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521178" version="1" comment="libudev1-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521179" version="1" comment="systemd is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521180" version="1" comment="systemd-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521181" version="1" comment="systemd-bash-completion is &lt;228-150.66.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521182" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521183" version="1" comment="udev is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519006" version="1" comment="shadow is &lt;4.2.1-27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521890" version="1" comment="kernel-default is &lt;4.12.14-95.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521891" version="1" comment="kernel-default-devel is &lt;4.12.14-95.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521892" version="1" comment="kernel-default-extra is &lt;4.12.14-95.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521893" version="1" comment="kernel-devel is &lt;4.12.14-95.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521894" version="1" comment="kernel-macros is &lt;4.12.14-95.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521895" version="1" comment="kernel-source is &lt;4.12.14-95.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521896" version="1" comment="kernel-syms is &lt;4.12.14-95.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334129" version="1" comment="tigervnc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519751" version="1" comment="unixODBC is &lt;2.3.6-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519752" version="1" comment="unixODBC-32bit is &lt;2.3.6-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520633" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519962" version="1" comment="libblkid1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519963" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519964" version="1" comment="libfdisk1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519965" version="1" comment="libmount1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519966" version="1" comment="libmount1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519967" version="1" comment="libsmartcols1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519968" version="1" comment="libuuid-devel is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519969" version="1" comment="libuuid1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519970" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519971" version="1" comment="python-libmount is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519972" version="1" comment="util-linux is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519973" version="1" comment="util-linux-lang is &lt;2.29.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519974" version="1" comment="util-linux-systemd is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519975" version="1" comment="uuidd is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519126" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519127" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521018" version="1" comment="libjasper1 is &lt;1.900.14-195.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521019" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520654" version="1" comment="libwireshark8 is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520655" version="1" comment="libwiretap6 is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520656" version="1" comment="libwscodecs1 is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520657" version="1" comment="libwsutil7 is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520658" version="1" comment="wireshark is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520659" version="1" comment="wireshark-gtk is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512588" version="1" comment="pam_yubico is &lt;2.26-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334133" version="1" comment="openvpn is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521825" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522052" version="1" comment="evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522053" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522054" version="1" comment="evince-lang is &lt;3.20.2-6.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522055" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522056" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522057" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522058" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522059" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522060" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522061" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522062" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522063" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522064" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522065" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522349" version="1" comment="gdb is &lt;8.3.1-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334137" version="1" comment="mgetty is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339049" version="1" comment="postgresql10 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334198" version="1" comment="postgresql96 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521451" version="1" comment="libecpg6 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521452" version="1" comment="libpq5 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521453" version="1" comment="libpq5-32bit is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521454" version="1" comment="postgresql10 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521539" version="1" comment="postgresql96 is &lt;9.6.13-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521897" version="1" comment="libvirt is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521898" version="1" comment="libvirt-admin is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521899" version="1" comment="libvirt-client is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521900" version="1" comment="libvirt-daemon is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521901" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521902" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521903" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521904" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521905" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521906" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521907" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521908" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521909" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521910" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521911" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521912" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521913" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521914" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521915" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521916" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521917" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521918" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521919" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521920" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521921" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521922" version="1" comment="libvirt-doc is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521923" version="1" comment="libvirt-libs is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521936" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521937" version="1" comment="libpq5 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521938" version="1" comment="libpq5-32bit is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521939" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522105" version="1" comment="libecpg6 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522106" version="1" comment="libpq5 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522107" version="1" comment="libpq5-32bit is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522108" version="1" comment="postgresql10 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522120" version="1" comment="ghostscript is &lt;9.26a-23.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522121" version="1" comment="ghostscript-x11 is &lt;9.26a-23.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522302" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522303" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522304" version="1" comment="libdcerpc0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522305" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522306" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522307" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522308" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522309" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522310" version="1" comment="libndr-standard0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522311" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522312" version="1" comment="libndr0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522313" version="1" comment="libndr0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522314" version="1" comment="libnetapi0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522315" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522316" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522317" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522318" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522319" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522320" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522321" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522322" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522323" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522324" version="1" comment="libsamba-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522325" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522326" version="1" comment="libsamdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522327" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522328" version="1" comment="libsmbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522329" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522330" version="1" comment="libsmbconf0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522331" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522332" version="1" comment="libsmbldap0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522333" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522334" version="1" comment="libtevent-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522335" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522336" version="1" comment="libwbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522337" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522338" version="1" comment="samba is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522339" version="1" comment="samba-client is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522340" version="1" comment="samba-client-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522341" version="1" comment="samba-doc is &lt;4.6.16+git.169.064abe062be-3.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522342" version="1" comment="samba-libs is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522343" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522344" version="1" comment="samba-winbind is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522345" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334046" version="1" comment="ceph is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521084" version="1" comment="libwireshark9 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521085" version="1" comment="libwiretap7 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521086" version="1" comment="libwscodecs1 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521087" version="1" comment="libwsutil8 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521088" version="1" comment="wireshark is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521089" version="1" comment="wireshark-gtk is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521152" version="1" comment="libxslt-tools is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521153" version="1" comment="libxslt1 is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521154" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521136" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521137" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521138" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.1-2.41.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521139" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521140" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521141" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522383" version="1" comment="ucode-intel is &lt;20191112a-13.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339058" version="1" comment="iptables is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521120" version="1" comment="atftp is &lt;0.7.0-160.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334145" version="1" comment="gnome-desktop is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334146" version="1" comment="wpa_supplicant is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521224" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521225" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562509" version="1" comment="MozillaFirefox is &lt;60.7.1-109.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562510" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.1-109.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521537" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521538" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522245" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522246" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522247" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521976" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521977" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521978" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521979" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521980" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521981" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521982" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521983" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521984" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521985" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521986" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522433" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522434" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522675" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522676" version="1" comment="libfreebl3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522677" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522678" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522679" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522680" version="1" comment="mozilla-nspr-32bit is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522681" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522682" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522683" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522684" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522685" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522686" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522687" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522122" version="1" comment="qemu is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522123" version="1" comment="qemu-block-curl is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522124" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522125" version="1" comment="qemu-kvm is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522126" version="1" comment="qemu-seabios is &lt;1.11.0-5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522127" version="1" comment="qemu-sgabios is &lt;8-5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522128" version="1" comment="qemu-tools is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522129" version="1" comment="qemu-vgabios is &lt;1.11.0-5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522130" version="1" comment="qemu-x86 is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334147" version="1" comment="gvfs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522401" version="1" comment="clamav is &lt;0.100.3-33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521427" version="1" comment="gvim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521428" version="1" comment="vim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521429" version="1" comment="vim-data is &lt;7.4.326-17.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522634" version="1" comment="dbus-1 is &lt;1.8.22-29.17.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522635" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.17.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522636" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.17.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522637" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.17.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522027" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522028" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522029" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522218" version="1" comment="ghostscript is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522219" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522020" version="1" comment="ImageMagick is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522021" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522022" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522023" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522024" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522025" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522026" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521943" version="1" comment="glib2-lang is &lt;2.48.2-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521944" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521945" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521946" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521947" version="1" comment="libgio-fam is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521948" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521949" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521950" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521951" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521952" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521953" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521954" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521955" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522220" version="1" comment="gpg2 is &lt;2.0.24-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522221" version="1" comment="gpg2-lang is &lt;2.0.24-9.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522153" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522154" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522155" version="1" comment="openldap2-client is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522156" version="1" comment="openldap2-doc is &lt;2.4.41-18.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521987" version="1" comment="libxslt-tools is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521988" version="1" comment="libxslt1 is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521989" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521940" version="1" comment="libzmq3 is &lt;4.0.4-15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522075" version="1" comment="libwireshark9 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522076" version="1" comment="libwiretap7 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522077" version="1" comment="libwscodecs1 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522078" version="1" comment="libwsutil8 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522079" version="1" comment="wireshark is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522080" version="1" comment="wireshark-gtk is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522236" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522237" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522249" version="1" comment="sudo is &lt;1.8.20p2-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522144" version="1" comment="ibus is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522145" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522146" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522147" version="1" comment="ibus-gtk3-32bit is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522148" version="1" comment="ibus-lang is &lt;1.5.13-15.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522149" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522150" version="1" comment="libibus-1_0-5-32bit is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522151" version="1" comment="python-ibus is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522152" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522648" version="1" comment="dnsmasq is &lt;2.78-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522399" version="1" comment="cpio is &lt;2.11-36.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522400" version="1" comment="cpio-lang is &lt;2.11-36.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522381" version="1" comment="ghostscript is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522382" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522533" version="1" comment="libssh4 is &lt;0.6.3-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522534" version="1" comment="libssh4-32bit is &lt;0.6.3-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522443" version="1" comment="kernel-default is &lt;4.12.14-95.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522444" version="1" comment="kernel-default-devel is &lt;4.12.14-95.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522445" version="1" comment="kernel-default-extra is &lt;4.12.14-95.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522446" version="1" comment="kernel-devel is &lt;4.12.14-95.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522447" version="1" comment="kernel-macros is &lt;4.12.14-95.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522448" version="1" comment="kernel-source is &lt;4.12.14-95.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522449" version="1" comment="kernel-syms is &lt;4.12.14-95.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522551" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522552" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522553" version="1" comment="libdcerpc0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522554" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522555" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522556" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522557" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522558" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522559" version="1" comment="libndr-standard0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522560" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522561" version="1" comment="libndr0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522562" version="1" comment="libndr0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522563" version="1" comment="libnetapi0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522564" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522565" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522566" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522567" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522568" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522569" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522570" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522571" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522572" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522573" version="1" comment="libsamba-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522574" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522575" version="1" comment="libsamdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522576" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522577" version="1" comment="libsmbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522578" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522579" version="1" comment="libsmbconf0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522580" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522581" version="1" comment="libsmbldap0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522582" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522583" version="1" comment="libtevent-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522584" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522585" version="1" comment="libwbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522586" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522587" version="1" comment="samba is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522588" version="1" comment="samba-client is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522589" version="1" comment="samba-client-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522590" version="1" comment="samba-doc is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522591" version="1" comment="samba-libs is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522592" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522593" version="1" comment="samba-winbind is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522594" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522282" version="1" comment="ImageMagick is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522283" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522284" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522285" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522286" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522287" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522288" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522217" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522500" version="1" comment="libopenssl1_1 is &lt;1.1.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522501" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522232" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522243" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522244" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522233" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522234" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522688" version="1" comment="libopenssl1_1 is &lt;1.1.1d-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522689" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522235" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522690" version="1" comment="openssl-1_1 is &lt;1.1.1d-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333943" version="1" comment="openssl-1_0_0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522600" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522601" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522602" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522603" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521711" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521527" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521712" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521713" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521714" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522485" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522486" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522487" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522488" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334155" version="1" comment="gcc33 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522214" version="1" comment="expat is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522215" version="1" comment="libexpat1 is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522216" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522421" version="1" comment="clamav is &lt;0.100.3-33.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522264" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522265" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522266" version="1" comment="python is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522267" version="1" comment="python-base is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522268" version="1" comment="python-curses is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522269" version="1" comment="python-devel is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522270" version="1" comment="python-tk is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522271" version="1" comment="python-xml is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522272" version="1" comment="sysstat is &lt;12.0.2-10.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522240" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522241" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522242" version="1" comment="sqlite3 is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522261" version="1" comment="openconnect is &lt;7.08-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522262" version="1" comment="openconnect-lang is &lt;7.08-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522668" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522669" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562585" version="1" comment="rsyslog is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522402" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522403" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334303" version="1" comment="libsoup is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522420" version="1" comment="libtomcrypt0 is &lt;1.17-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522350" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522351" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334187" version="1" comment="python3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522387" version="1" comment="aspell is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522388" version="1" comment="libaspell15 is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522389" version="1" comment="libaspell15-32bit is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521756" version="1" comment="clamav is &lt;0.100.3-33.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334189" version="1" comment="libqt5-qtbase is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522550" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339079" version="1" comment="virglrenderer is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339082" version="1" comment="fribidi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522429" version="1" comment="xen is &lt;4.11.3_02-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522430" version="1" comment="xen-libs is &lt;4.11.3_02-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522431" version="1" comment="xen-libs-32bit is &lt;4.11.3_02-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522640" version="1" comment="sudo is &lt;1.8.20p2-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334161" version="1" comment="trousers is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522674" version="1" comment="libzypp is &lt;16.21.2-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522632" version="1" comment="wicked is &lt;0.6.60-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522633" version="1" comment="wicked-service is &lt;0.6.60-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522453" version="1" comment="dia is &lt;0.97.3-17.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522454" version="1" comment="dia-lang is &lt;0.97.3-17.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522597" version="1" comment="sysstat is &lt;12.0.2-10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338726" version="1" comment="transfig is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339088" version="1" comment="shadow is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522641" version="1" comment="ImageMagick is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522642" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522643" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522644" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522645" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522646" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522647" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521704" version="1" comment="kernel-default is &lt;4.4.176-94.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521705" version="1" comment="kernel-default-devel is &lt;4.4.176-94.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521706" version="1" comment="kernel-default-extra is &lt;4.4.176-94.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521707" version="1" comment="kernel-devel is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521708" version="1" comment="kernel-macros is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521709" version="1" comment="kernel-source is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521710" version="1" comment="kernel-syms is &lt;4.4.176-94.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522374" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522375" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522376" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522377" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522378" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522379" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522380" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522490" version="1" comment="mariadb is &lt;10.2.22-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522491" version="1" comment="mariadb-client is &lt;10.2.22-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499000" version="1" comment="mariadb-errormessages is &lt;10.2.22-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522081" version="1" comment="libmysqlclient18 is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522082" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522083" version="1" comment="libmysqlclient_r18 is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522084" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522085" version="1" comment="mariadb-100-errormessages is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522109" version="1" comment="libmariadb3 is &lt;3.1.2-2.6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522110" version="1" comment="libmariadb_plugins is &lt;3.1.2-2.6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522253" version="1" comment="libmysqlclient18 is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522254" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522255" version="1" comment="libmysqlclient_r18 is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522256" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522111" version="1" comment="mariadb is &lt;10.2.25-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522257" version="1" comment="mariadb-100-errormessages is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522112" version="1" comment="mariadb-client is &lt;10.2.25-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522113" version="1" comment="mariadb-errormessages is &lt;10.2.25-3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522435" version="1" comment="mariadb is &lt;10.2.29-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522436" version="1" comment="mariadb-client is &lt;10.2.29-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522437" version="1" comment="mariadb-errormessages is &lt;10.2.29-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522039" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522040" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522404" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522405" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522595" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.232-27.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522596" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.232-27.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522438" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522439" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522440" version="1" comment="libmysqlclient_r18 is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522441" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522442" version="1" comment="mariadb-100-errormessages is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334167" version="1" comment="permissions is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522422" version="1" comment="permissions is &lt;20170707-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522280" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522281" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521715" version="1" comment="adcli is &lt;0.8.2-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521716" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521717" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521718" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521719" version="1" comment="libsss_sudo is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521720" version="1" comment="python-sssd-config is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521721" version="1" comment="sssd is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521722" version="1" comment="sssd-32bit is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521723" version="1" comment="sssd-ad is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521724" version="1" comment="sssd-ipa is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521725" version="1" comment="sssd-krb5 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521726" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521727" version="1" comment="sssd-ldap is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521728" version="1" comment="sssd-proxy is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521729" version="1" comment="sssd-tools is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521596" version="1" comment="libspice-server1 is &lt;0.12.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334169" version="1" comment="spice-gtk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521687" version="1" comment="libwsman1 is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521688" version="1" comment="libwsman_clientpp1 is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521689" version="1" comment="openwsman-server is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521226" version="1" comment="gnome-shell is &lt;3.20.4-77.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521227" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521228" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521229" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334172" version="1" comment="ldb is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521696" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521697" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521090" version="1" comment="libvirt is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521091" version="1" comment="libvirt-admin is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521092" version="1" comment="libvirt-client is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521093" version="1" comment="libvirt-daemon is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521094" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521095" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521096" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521097" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521098" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521099" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521100" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521101" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521102" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521103" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521104" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521105" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521106" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521107" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521108" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521109" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521110" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521111" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521112" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521113" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521114" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521115" version="1" comment="libvirt-doc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521116" version="1" comment="libvirt-libs is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522505" version="1" comment="libvirt is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522506" version="1" comment="libvirt-admin is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522507" version="1" comment="libvirt-client is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522508" version="1" comment="libvirt-daemon is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522509" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522510" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522511" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522512" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522513" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522514" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522515" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522516" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522517" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522518" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522519" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522520" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522521" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522522" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522523" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522524" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522525" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522526" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522527" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522528" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522529" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522530" version="1" comment="libvirt-doc is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522531" version="1" comment="libvirt-libs is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521685" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521686" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334173" version="1" comment="libssh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521117" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521118" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521526" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521924" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521040" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521041" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521042" version="1" comment="libdcerpc0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521043" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521044" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521045" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521046" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521047" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521048" version="1" comment="libndr-standard0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521049" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521050" version="1" comment="libndr0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521051" version="1" comment="libndr0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521052" version="1" comment="libnetapi0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521053" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521054" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521055" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521056" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521057" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521058" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521059" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521060" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521061" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521062" version="1" comment="libsamba-util0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521063" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521064" version="1" comment="libsamdb0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521065" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521066" version="1" comment="libsmbclient0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521067" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521068" version="1" comment="libsmbconf0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521069" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521070" version="1" comment="libsmbldap0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521071" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521072" version="1" comment="libtevent-util0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521073" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521074" version="1" comment="libwbclient0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521075" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521076" version="1" comment="samba is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521077" version="1" comment="samba-client is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521078" version="1" comment="samba-client-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521079" version="1" comment="samba-doc is &lt;4.6.16+git.154.2998451b912-3.40.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521080" version="1" comment="samba-libs is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521081" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521082" version="1" comment="samba-winbind is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521083" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522535" version="1" comment="Mesa is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522536" version="1" comment="Mesa-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522537" version="1" comment="Mesa-dri is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522538" version="1" comment="Mesa-dri-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522539" version="1" comment="Mesa-libEGL1 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522540" version="1" comment="Mesa-libEGL1-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522541" version="1" comment="Mesa-libGL1 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522542" version="1" comment="Mesa-libGL1-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522543" version="1" comment="Mesa-libGLESv2-2 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522544" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522545" version="1" comment="Mesa-libglapi0 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522546" version="1" comment="Mesa-libglapi0-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522547" version="1" comment="libgbm1 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522548" version="1" comment="libgbm1-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522549" version="1" comment="libxatracker2 is &lt;1.0.0-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562635" version="1" comment="e2fsprogs is &lt;1.43.8-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562636" version="1" comment="libcom_err2 is &lt;1.43.8-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562637" version="1" comment="libcom_err2-32bit is &lt;1.43.8-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562638" version="1" comment="libext2fs2 is &lt;1.43.8-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522628" version="1" comment="e2fsprogs is &lt;1.43.8-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522629" version="1" comment="libcom_err2 is &lt;1.43.8-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522630" version="1" comment="libcom_err2-32bit is &lt;1.43.8-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522631" version="1" comment="libext2fs2 is &lt;1.43.8-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521212" version="1" comment="curl is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521213" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521214" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522017" version="1" comment="curl is &lt;7.60.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522018" version="1" comment="libcurl4 is &lt;7.60.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522019" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522141" version="1" comment="curl is &lt;7.60.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522142" version="1" comment="libcurl4 is &lt;7.60.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522143" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334285" version="1" comment="openslp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521218" version="1" comment="libwireshark9 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521219" version="1" comment="libwiretap7 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521220" version="1" comment="libwscodecs1 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521221" version="1" comment="libwsutil8 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521222" version="1" comment="wireshark is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521223" version="1" comment="wireshark-gtk is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521764" version="1" comment="wget is &lt;1.14-21.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521455" version="1" comment="openssh is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521456" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521457" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521244" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521245" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521246" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522035" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522036" version="1" comment="libpolkit0-32bit is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522037" version="1" comment="polkit is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522038" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521654" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521655" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521656" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.6-2.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521657" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521658" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521659" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521961" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521962" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521963" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.2-2.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521964" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521965" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521966" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334177" version="1" comment="zeromq is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521620" version="1" comment="python-numpy is &lt;1.8.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522259" version="1" comment="dhcp is &lt;4.3.3-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522260" version="1" comment="dhcp-client is &lt;4.3.3-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334180" version="1" comment="lua is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334181" version="1" comment="lua51 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522502" version="1" comment="xen is &lt;4.11.1_04-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522503" version="1" comment="xen-libs is &lt;4.11.1_04-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522504" version="1" comment="xen-libs-32bit is &lt;4.11.1_04-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521699" version="1" comment="gd is &lt;2.1.0-24.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521700" version="1" comment="gd-32bit is &lt;2.1.0-24.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521757" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521027" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521028" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521029" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.0-2.38.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521030" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521031" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521032" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521516" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521517" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521518" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522114" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522115" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522116" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.4-2.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522117" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522118" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522119" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522393" version="1" comment="cups is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522394" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522395" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522396" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521702" version="1" comment="ntp is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521703" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521690" version="1" comment="libwireshark9 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521691" version="1" comment="libwiretap7 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521692" version="1" comment="libwscodecs1 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521693" version="1" comment="libwsutil8 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521694" version="1" comment="wireshark is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521695" version="1" comment="wireshark-gtk is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334213" version="1" comment="glib2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521236" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521237" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521777" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521238" version="1" comment="python is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521239" version="1" comment="python-base is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521240" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521241" version="1" comment="python-devel is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521242" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521243" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521778" version="1" comment="python3 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521779" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521780" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522015" version="1" comment="cron is &lt;4.2-59.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522016" version="1" comment="cronie is &lt;1.4.11-59.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339132" version="1" comment="cronie is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521024" version="1" comment="libntfs-3g84 is &lt;2013.1.13-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521025" version="1" comment="ntfs-3g is &lt;2013.1.13-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521026" version="1" comment="ntfsprogs is &lt;2013.1.13-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334186" version="1" comment="kernel-firmware is ==0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521941" version="1" comment="kernel-firmware is &lt;20190618-5.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521942" version="1" comment="ucode-amd is &lt;20190618-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522157" version="1" comment="libreoffice is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522158" version="1" comment="libreoffice-base is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522159" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522160" version="1" comment="libreoffice-branding-upstream is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522161" version="1" comment="libreoffice-calc is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522162" version="1" comment="libreoffice-calc-extensions is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522163" version="1" comment="libreoffice-draw is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522164" version="1" comment="libreoffice-filters-optional is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522165" version="1" comment="libreoffice-gnome is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522166" version="1" comment="libreoffice-gtk2 is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522167" version="1" comment="libreoffice-icon-themes is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522168" version="1" comment="libreoffice-impress is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522169" version="1" comment="libreoffice-l10n-af is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522170" version="1" comment="libreoffice-l10n-ar is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522171" version="1" comment="libreoffice-l10n-ca is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522172" version="1" comment="libreoffice-l10n-cs is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522173" version="1" comment="libreoffice-l10n-da is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522174" version="1" comment="libreoffice-l10n-de is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522175" version="1" comment="libreoffice-l10n-en is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522176" version="1" comment="libreoffice-l10n-es is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522177" version="1" comment="libreoffice-l10n-fi is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522178" version="1" comment="libreoffice-l10n-fr is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522179" version="1" comment="libreoffice-l10n-gu is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522180" version="1" comment="libreoffice-l10n-hi is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522181" version="1" comment="libreoffice-l10n-hu is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522182" version="1" comment="libreoffice-l10n-it is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522183" version="1" comment="libreoffice-l10n-ja is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522184" version="1" comment="libreoffice-l10n-ko is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522185" version="1" comment="libreoffice-l10n-nb is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522186" version="1" comment="libreoffice-l10n-nl is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522187" version="1" comment="libreoffice-l10n-nn is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522188" version="1" comment="libreoffice-l10n-pl is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522189" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522190" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522191" version="1" comment="libreoffice-l10n-ro is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522192" version="1" comment="libreoffice-l10n-ru is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522193" version="1" comment="libreoffice-l10n-sk is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522194" version="1" comment="libreoffice-l10n-sv is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522195" version="1" comment="libreoffice-l10n-xh is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522196" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522197" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522198" version="1" comment="libreoffice-l10n-zu is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522199" version="1" comment="libreoffice-mailmerge is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522200" version="1" comment="libreoffice-math is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522201" version="1" comment="libreoffice-officebean is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522202" version="1" comment="libreoffice-pyuno is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522203" version="1" comment="libreoffice-writer is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522204" version="1" comment="libreoffice-writer-extensions is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522352" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522353" version="1" comment="libseccomp2-32bit is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521744" version="1" comment="bash is &lt;4.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521745" version="1" comment="bash-doc is &lt;4.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521746" version="1" comment="bash-lang is &lt;4.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521747" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521748" version="1" comment="libreadline6-32bit is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521749" version="1" comment="readline-doc is &lt;6.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521519" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521520" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521521" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-18.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521493" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521494" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521495" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521522" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521523" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521496" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521497" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521498" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521499" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521500" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521501" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521524" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521525" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521502" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521503" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521504" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521505" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521506" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521507" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521508" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521509" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521510" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521511" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521512" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521513" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521514" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521515" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522619" version="1" comment="libsystemd0 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522620" version="1" comment="libsystemd0-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522621" version="1" comment="libudev1 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522622" version="1" comment="libudev1-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522623" version="1" comment="systemd is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522624" version="1" comment="systemd-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522625" version="1" comment="systemd-bash-completion is &lt;228-150.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522626" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522627" version="1" comment="udev is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522670" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522671" version="1" comment="libpq5 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522672" version="1" comment="libpq5-32bit is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522673" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334171" version="1" comment="gnome-shell is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334207" version="1" comment="compat-openssl098.703 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522665" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522666" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522598" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522599" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522667" version="1" comment="ipmitool is &lt;1.8.18-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522638" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522639" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562739" version="1" comment="permissions is &lt;20170707-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522651" version="1" comment="ppp is &lt;2.4.7-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123258"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-100-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilc-1_1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilcclient-1_1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns169</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblwres160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler44</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sametime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd-legacy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ekiga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-mission-control-plugin-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-3_0-25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl098</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-driver-video</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libc-client2007e_suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xdg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-ncurses-pkg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-qt-pkg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_1-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-jar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj_bc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libformula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgltf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-share-linker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepository</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-stream-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserializer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-0_4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>malaga-suomi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-reporting-flow-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc.i686</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-backports.ssl_match_hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfltk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwengui-gtk2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwenhywfar60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwenhywfar60-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-uk_UA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenCOLLADA0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hexchat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblhasa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstegl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrootd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_10-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-user-dirs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubikey-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo0_9_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podofo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents_books-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id_ID</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkg-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui-gtk3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatalk12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfsmaintenance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykcs11-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykpiv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubico-piv-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_u2f</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_yubico</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iptables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb_plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman_clientpp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua51</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl098.703</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009079458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">0</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.11-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-25.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-184.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-184.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-59.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19-16.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-148.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.11-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.21-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.35-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.18-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-4.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-24.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-182.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-181.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-54.100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.27-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0esr-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-13.253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-15.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-18.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.11.2-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.31-20.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-30.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-242.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-4.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.5+git.27.6afd48b1083-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-9.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.392</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-13.232</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.16-1.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.178</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-17.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-31.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-49.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.429</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-73.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-100.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-100.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.1129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.4-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-26.182</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-36.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112-2.189</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-8.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-153.145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-12.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-36.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-57.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.1-4.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-4.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-4.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-21.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1.213</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-5.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5.1-42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.5.2-43.38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-11.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-24.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-22.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-70.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-18.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.25-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-1.164</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5.191</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.16-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.3-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-4.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-7.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-8.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-1.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.1-3.268</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.3-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-4.95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.9.0+git20170610.f6dd59a-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06_k3.12.28_4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12_k3.12.49_11-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.0_12-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_08-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.0_08-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-352.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-353.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.44.2-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-8.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-94.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-99.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.4.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.2-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.20-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.108-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.155-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-37.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.36-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.48-3.29.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.13-8.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-2.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-3.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-14.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-16.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-5.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-7.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-117.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-2.149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.179</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.15.0-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.265</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-1.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-17.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.08-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-1.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-28.3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-113.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-33.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.5-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.5-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-3.88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-13.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1_08-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1_08_k3.12.28_4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.9.0+git20170610.f6dd59a-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10.1-2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-22.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_k3.12.55_52.42-22.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2_06-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2_06_k3.12.53_60.30-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-17.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-19.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2007e_suse-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.23.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-3.200</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-70.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-11.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-44.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-6.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-83.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-83.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.16-11.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.16-11.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.4-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.4-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.1-8.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.1-8.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.11-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.1-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.7-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.39.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.20-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.32-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.32-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1_10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1_10_k3.12.36_38-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-269.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3_08_k3.12.59_60.45-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-23.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.19-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.641_ge4ef6e9-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.770_gcb6ba2da-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917+git781.c8990575-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-50.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-33.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.10-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009107086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20150827-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20150827-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.6-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-28.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.20-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.21-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-33.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:210-70.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:210-70.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:210-104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:210-104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.1-9.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-27.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.16-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.43.8-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-4.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.2-1.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:037-51.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-20.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.4-14.216</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-242.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.10-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.39-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_04-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_04_k3.12.39_47-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_02-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_02_k3.12.38_44-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_06-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_06_k3.12.39_47-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.29-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.29-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_k3.12.43_52.6-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2_02-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2_02_k3.12.49_11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.76-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_k3.12.48_52.27-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.22-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.22-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_k3.12.44_52.10-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-100.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-100.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-17.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-10.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.5-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.0-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-24.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-24.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-24.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.10-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-46.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12.4-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.22-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-22.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_k3.12.48_52.27-22.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0beta-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0beta-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0beta-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.72-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-46.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.0-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-56.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-56.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-73.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-73.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-104.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.11-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.3.2-40.5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.3.2-40.5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170511-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170511-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.11-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.5.2-43.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.5.2-43.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170511-16.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170511-16.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.25-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1_3335ac1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3.2-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3.2-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20160511-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20160511-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_04-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_04_k3.12.67_60.64.24-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_04-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-17.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-11.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.621-130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_06-22.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_06_k3.12.69_60.64.32-22.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-43.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-27.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-23.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.158-7.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.41.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.57-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-1.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-95.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.11-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.16-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.26-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.28-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.626-133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.632-137.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.635-140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.637-143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.10-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.10-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4+git.1481215985.12b091b-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.0esr-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.13-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.35.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.15-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2007e_suse-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3_10-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3_10_k3.12.62_60.62-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.27-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.29-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_02-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_02_k3.12.67_60.64.18-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_02-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:210-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:210-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.13-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.643-146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.644-149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.0.186-152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:037-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.6.2-4.12.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-25.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_10-22.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_10_k3.12.69_60.64.35-22.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_03-43.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.37-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.21-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.21-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_06-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.13-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.54.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.144-27.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_11-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.33_k4.4.114_94.11-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8-48.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-19.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.123.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180525-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.9-48.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_04-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_12-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4_02-43.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1_02-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_06-43.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4_06-43.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1_08-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.312-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.312.333-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.312.333-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.5+git.1524775272.5e7ea8cf03-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2.8+git.1536505967.080f2248ff-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-269.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-48.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-48.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20140630-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.0.194-155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.0.221-158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0.127-162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0.148-165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0.171-168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.30-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_14-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180312-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180807a-13.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_02-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-49.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.33_k4.4.73_5-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.2-27.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.19.0-2.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.6-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.32-21.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.32-21.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_04-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-109.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-109.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-109.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.11-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_06-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-2.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-10.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-10.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.0-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.13-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.4-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.3.2-43.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.3.2-43.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180403-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180403-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.13-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044.1-109.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-25.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.20-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4.2-43.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4.2-43.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-23.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1001.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1001.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_04-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.34-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.150.1540e575faf-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.150.1540e575faf-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5.2-43.38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5.2-43.38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.7+git.1531910353.c0ef85b854-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_06-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.9-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_08-3.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190514-13.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_04-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-13.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2_02-2.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2_04-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.10+git.1549630712.bb089269ea-2.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3_03-3.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.6-19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.6-19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-13.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.3.2-43.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.3.2-43.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-10.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190423-16.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190423-16.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.12+git.1568024032.02236657ca-2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1_02-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.93.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3_03-3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-48.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-95.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_02-3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.3.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1_06-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180807-13.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.231-43.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-109.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-109.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-161.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-48.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.13-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.14-48.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112a-13.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.1-109.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-48.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.3_02-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.60-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-2.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.1-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.29-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.29-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232-27.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170707-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-21.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.2-8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-48.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-2.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-2.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1_04-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.13-48.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.13-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-43.56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-43.56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170707-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
